Image retrieval is an active research area in image processing, pattern recognition, and
computer vision. In this proposed method, there are two techniques to extract the feature
vector, the first one is applying the transformed algorithm on the whole image and the second
is to divide the image into four blocks and then applying the transform algorithm on each part
of the image. In each technique there are three transform algorithm that have been applied
(DCT, Walsh Transform, and Kekre’s Wavelet Transform) then finding the similarity and
indexing the images, useing the correlation between feature vector of the query image and
images in database. The retrieved method depends on higher indexing number.
Experimental results have shown better results (higher precision and recall) by applying
DCT on the image than the other transform algorithms and the performance improvement if
dividing the image into equal four blocks and applying the transformed algorithm into each
part
Background: Assessment of fracture healing is a common problem in orthopedic practice and research. Computerized Tomography (CT) is a reliable tool for quantification of the fracture repair process in experimental animals. Histomorphometric evaluation provides a clear quantitative evidence of the bone healing process. The evaluation by micro-architectures in healing bone showed variable correlation between CT and histomorphometry.
Material and methods: open ulnar osteotomy induced in twenty young male rabbits under general anesthesia without internal fixation, and divided into five groups. A group of animals were sacrificed at end of 2nd week, 3rd week, 4th week, 5th week, and 6th week. The right ulna iso
This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta
... Show MoreDiabetic nephropathy (DN) is a principle cause of microangiopathy and the main reason for kidney disease at the end stage in patients with type 2 diabetes mellitus (T2DM). This work aimed to study the relation of pentosidine with kidney injury in the case of diabetic nephropathy. This study included 75 patients suffering from T2DM and 75 apparently healthy subjects. The patients group was divided into three groups ((normoalbumin, microalbuminuria, and macroalbuminuria; 25 patients for each) on the basis of albumin-creatinine ratio (ACR) . The level of serum pentosidine was determined using an ELISA kit. The level of pentosidine was found to be significantly higher in DN patients than in the healthy group. Also, the results revealed a str
... Show MoreThis study was carried out in the Center of Endocrinology and Diabetes in Baghdad during the period between October 2019 to February 2020. The aim was to measure the level of some apoptosis markers and some autoimmune antibodies related to the thyroid gland in Iraqi patients with hyperthyroidism and evaluate the correlation between all the measured parameters. The study included 88 patients who were divided into three groups; group 1 included 30 newly diagnosed hyperthyroidism patients (24 females, 6 males); group 2 included 30 patients of hyperthyroidism who were under treatment (28, 2 males); group 3 included 28 healthy individuals as control group (22 females, 6 males).
Most of the patient's ages
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreAPDBN Rashid, International Journal of Humanities and Social Sciences/ RIMAK, 2023
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show More