تعتبر شبكية العين جزءًا مهمًا من العين لأن الأطباء يستخدمون صورها لتشخيص العديد من أمراض العيون مثل الجلوكوما واعتلال الشبكية السكري وإعتام عدسة العين. في الواقع، يعد تصوير الشبكية المجزأ أداة قوية للكشف عن النمو غير العادي في منطقة العين بالإضافة إلى تحديد حجم وبنية القرص البصري. يمكن أن يؤدي الجلوكوما إلى إتلاف القرص البصري، مما يغير مظهر القرص البصري للعين. تعمل تقنيتنا على الكشف عن الجلوكوما وتصنيفها في هذه الدراسة. تستخدم المرحلة الأولى من هذا النظام الأنماط الثنائية المحلية (LBP) للحصول على خرائط للميزات التركيبية. يتم تنفيذ التصنيف الثنائي لصور الجلوكوما بشكل منفصل عن الصور العادية باستخدام تقنية التعلم العميق في الخطوة الثانية من هذا النظام. بالنسبة لتحديات التصنيف، استخدمنا تقنية الشبكة الكثيفة، وهي تقنية التعلم العميق. وتبقى دقتها في حدود 96% حسب نتائج الطريقة المقترحة.
This research include building mathematical models for aggregating planning and shorting planning by using integer programming technique for planning master production scheduling in order to control on the operating production for manufacturing companies to achieve their objectives of increasing the efficiency of utilizing resources and reduce storage and improving customers service through deliver in the actual dates and reducing delays.
Abstract
The goal of current research to describe and diagnose the level of attention of doctors to design and regulatory dimensions, (strategic vision, organizational structure, organizational processes, business systems, personnel), and the performance of hospitals and dimensions, in six hospitals in medicine and selected a sample for research, as well as identify organizational design effect in the performance of hospitals and dimensions (efficiency, the development of human resources, patient satisfaction, achieve financial results, quality of health care).
Research has focused in part theoretical on key variables to look organizational des
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreChilled ceilings systems offer potential for overall capital savings. The main aim of the present research is to investigate the thermal performance of the indirect contact closed circuit cooling tower, ICCCCT used with chilled ceiling, to gain a deeper knowledge in this important field of engineering which has been traditionally used in various industrial & HVAC systems. To achieve this study, experimental work were implemented for the ICCCCT use with chilled ceiling. In this study the thermal performances of closed wet cooling tower use with chilled ceiling is experimentally and theoretically investigated. Different experimental tests were conducted by varying the controlling parameters to investigate their effects
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreNumerical study of separation control on symmetrical airfoil, four digits (NACA
0012) by using rotating cylinder with double steps on its upper surface based on the computation of Reynolds-average Navier- Stokes equations was carried out to find the optimum configuration of unconventional airfoil for best aerodynamics performance. A model based on collocated Finite Volume Method was developed to solve the governing equations on a body-fitted coordinate system. A revised (k-w) model was proposed as a known turbulence model. This model was adapted to simulate the control effects of rotating cylinder. Numerical solutions were performed for flow around unconventional airfoil with cylinder to main stream velocities ratio in the range
... Show MoreThe Sebkha is considered the evaporative geomorphological features, where climate plays an active role. It forms part of the surface features in Mesopotamia plain of Iraqi, which is the most fertile lands, and because of complimentary natural and human factors turned most of the arable land to the territory of Sebkha lands. The use satellite image (Raw Data), Landsat 30M Mss for the year 1976 Landsat 7 ETM, and the Landsat 8 for year 2013 (LDCM) for the summer Landsat Data Continuity Mission and perform geometric correction, enhancements, and Subset image And a visual analysis Space visuals based on the analysis of spectral fingerprints earth's This study has shown that the best in the discrimination of Sebkha Remote sensing techniques a
... Show More
