We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). Standard Deviation, Mean, Energy and Entropy are extorted using the histogram approach for each merger space. These features are found to be higher in occurrence in the tumor region than the non-tumor one. MRI scans of the five brains with 60 slices from each are utilized for testing the proposed method’s authenticity. These brain images (230 slices as normal and 70 abnormal) are accessed from the Internet Brain Segmentation Repository (IBSR) dataset. 60% images for training and 40% for testing phase are used. Average classification accuracy as much as 98.02% (training) and 98.19% (testing) are achieved.
A new ligand complexes have been synthesis from reaction of metal ions of MnII , CoII , NiII , CuII , ZnII , CdII and PdII with schiff base [(E)-1-((2-amino-5-(3, 4, 5-trimethoxybenzyl) pyrimidin-4-ylimino) methyl) naphthalen-2-ol [HL)]. The prepared [HL] was characterized by FT-IR, UV-Vis spectroscopy, 1H13CNMR spectra Mass spectra and melting point. The compounds were characterized by techniques UV-Vis and FT-IR spectral studies, micro analysis (C.H.N), determination of atomic absorption, chloride content, molar conductivity measurements, magnetic susceptibility and melting point. The ligand acts as a monobasic tridentate, coordinating through deprotonated phenolic O and azomethine N atoms. The compounds are neutral electrolytic in dimeth
... Show MoreA new ligand (H4L) and its complexes with ( ZnII, CdII and HgII) were prepared. This ligand was prepared in two steps. In the first step a solution of terephthaldehyde in methanol was reacted under reflux with 1,2-phenylenediamine to give an precursor compound which reacted in the second step with 2,4-dihydroxybenzaldehyde to give the ligand. The complexes were then synthesized by direct reaction of the corresponding metal chloride with the ligand. The ligand and complexes were characterized by spectroscopic methods FT-IR, UV-Vis, 1HNMR, and atomic absorption, chloride content, HPLC, mole-ratio determination. in addition to conductivity measurement. The data of these measurements suggest a distorted tetrahedral g
... Show MoreIn this research, we did this qualitative and quantitative study in order to improve the assay of aspirin colorimetrically using visible spectrophotometer. This method depends on aqueous hydrolysis of aspirin and then treating it with the ferric chloride acidic solution to give violet colored complex with salicylic acid, as a result of aspirin hydrolysis, which has a maximum absorption at 530nm. This procedure was applied to determine the purity of aspirin powder and tablet. The results were approximately comparative so that the linearity was observed in the high value of both correlation coefficient (R= 0.998) and Determination Coefficient or Linearity (R2= 0.996) while the molar absorpitivity was 1.3× 103 mole
In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.
Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.
Based on this principle, a statistical questionnaire was designed to
... Show MoreA condense study was done to compare between the ordinary estimators. In particular the maximum likelihood estimator and the robust estimator, to estimate the parameters of the mixed model of order one, namely ARMA(1,1) model.
Simulation study was done for a varieties the model. using: small, moderate and large sample sizes, were some new results were obtained. MAPE was used as a statistical criterion for comparison.
Abstract
The use of modern scientific methods and techniques, is considered important topics to solve many of the problems which face some sector, including industrial, service and health. The researcher always intends to use modern methods characterized by accuracy, clarity and speed to reach the optimal solution and be easy at the same time in terms of understanding and application.
the research presented this comparison between the two methods of solution for linear fractional programming models which are linear transformation for Charnas & Cooper , and denominator function restriction method through applied on the oil heaters and gas cookers plant , where the show after reac
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
The size and the concentration of the gold nanoparticles (GNPs)
synthesized in double distilled deionized water (DDDW) have been
found to be affected by the laser energy and the number of pulses.
The absorption spectra of the nanoparticles DDDW, and the
surface plasmon resonance (SPR) peaks were measured, and found to
be located between (509 and 524)nm using the UV- Vis
spectrophotometer. SPR calculations, images of transmission
electron microscope, and dynamic light scattering (DLS) method
were used to determine the size of GNPs, which found to be ranged
between (3.5 and 27) nm. The concentrations of GNPs in colloidal
solutions found to be ranged between (37 and 142) ppm, and
measured by atomic absorptio