Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Methods: Sixty three cases of pleural and peritoneal smears, previously reported as benign (19) cases, malignant (21) cases or atypical (23) cases, were retrieved from the files. In each of these smears; nuclear area, perimeter, and roundness coefficient of 80-100 cell were determined at x400 magnification by the use of image analysis system. Statistical analysis was performed using analysis of variance and Tukey's HSD test. Results: The mean values of nuclear roundness, nuclear perimeter and nuclear area vary between the three groups (benign, atypical and malignant cells) by using analysis of variance (p > 0.01). The value of nuclear roundness, perimeter and area did not differ significantly between benign and atypical cells (Tukey’s test: p<0.01). On the other hand, the value of nuclear roundness, perimeter and area showed a significant difference between malignant and atypical cells(Tukey's test: p> 0.01). Conclusion: In conclusion, our data suggest that cytomorphometry performed on effusion smear cells may provide important information for the differentiation of atypical cells from malignant cells, in which the values of atypical cells are closer to those of benign cells during the examination of pleural and peritoneal smears by the use of image analysis system
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreIn this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s
Image Fusion Using A Convolutional Neural Network
This study explores the challenges in Artificial Intelligence (AI) systems in generating image captions, a task that requires effective integration of computer vision and natural language processing techniques. A comparative analysis between traditional approaches such as retrieval- based methods and linguistic templates) and modern approaches based on deep learning such as encoder-decoder models, attention mechanisms, and transformers). Theoretical results show that modern models perform better for the accuracy and the ability to generate more complex descriptions, while traditional methods outperform speed and simplicity. The paper proposes a hybrid framework that combines the advantages of both approaches, where conventional methods prod
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreThe main objective of this research is to use the methods of calculus ???????? solving integral equations Altbataah When McCann slowdown is a function of time as the integral equation used in this research is a kind of Volterra
The risk of breast cancer development is believed to be attributed to the alterations of a number of key biological components. Within this context, elevated levels of some chemokines that act as growth factors and can promote cancer development. The current study was designed to evaluate CXCL3 (a chemokine C-X-C Motif Ligand 3) and leptin (a peptide hormone synthesized by adipose tissue with cytokine activity) serum of Iraqi breast cancer patients in comparison to healthy controls. A total of 90 participants consisted of 60 patients diagnosed with breast cancer and 30 healthy women as control group were enrolled into this case-control study. Venous blood samples were collected from all participants to evaluate CXCL3 and leptin serum levels
... Show More