This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle curve is adopted to steer the vessel’s direction, while the cross-sections of the blood vessel are formed as a sequence of circles lying in planes that are orthogonal to the gradients of the middle curves. The radii for the circles are estimated as a distance between the intersection points of the blood vessel edges with the orthogonal plane to the middle curve gradient. The system then uses these circles and the middle curve gradients to produce a solid volume that represents the 3D shape of the blood vessel. The method was tested and evaluated using different cases of angiogram images, and showed a reasonable agreement between the generated shapes and the tested images.
Zinc Oxide nanoparticles were prepared using pulsed laser ablation process from a pure zinc metal placed inside a liquid environment. The latter is composed of acetyltrimethylammonium bromide (CTAB) of 10−3 molarity and distilled water. A Ti:Sapphire laser of 800 nm wavelength, 1 kHz pulse repetition rate, 130 fs pulse duration is used at three values of pulse energies of 0.05 mJ, 1.11 mJ and 1.15 mJ. The evaluation of the optical properties for the obtained suspension was applied through ultraviolet–visible absorption spectroscopy test (UV/VIS). The result showed peak wavelengths at 210 nm, 211 nm and 213 nm for the three used pulse energies 0.05 mJ, 1.11 mJ and 1.15 mJ respectively. This indicates a blue shift,
... Show MoreInhibition of T cell derived cytokine production could help suppress osteoclast differentiation in inflammatory skeletal disorders. Bisphosphonates are typically prescribed to prevent inflammatory bone loss but are not tolerated by all patients and are associated with an increased risk of osteonecrosis of the jaw. In light of this other anti-resorptives such as phytoestrogens are being considered. However the effect of phytoestrogens on T cell-induced osteoclast formation is unclear. The effect of genistein and coumestrol on activated T cell-induced osteoclastogenesis and cytokine production was therefore examined. Concentrations of genistein and coumestrol (10−7 M) previously shown to directly inhibit osteoclast formation also suppressed
... Show MoreIn the region of the north of Iraq using the method of analyzing thin section microfacies to 38 of rockyslices which were gathered from a place near Aqra city. These slides are divided into seven microfacies depending on lithologcal component and fossils.
1) Dolostone facies.
2)Recrystallized bioclastic wackestone facies.
3) Bioclastic packstone microfacies
4)Sucrosic dolomite facies.
5) Bioclastic grainstone in microfacies.
According to water energy, these facies were divided to three zone:
- a) Low energy environment.
- b) Transitional zone.
- c) High energy environment.
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.
... Show MoreIraq suffers from serious pollution with harmful particles that have important direct and indirect effects on human activities and human health. In this research, a system for detecting pollutants in the air was designed and manufactured using infrared laser technology. This system was used to detect the presence of pollutants in the dust storms that swept the city of Baghdad which could have a negative impact on human health and living organisms.
The designed detection system based on the use of infrared laser (IR) with a wavelength of 1064 nm was used for the purposes of detecting pollutants based on the scattering of the laser beam from these pollutants. The system was aligned to obtain the best signal for the scattered rays, w
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreA long-span Prestressed Concrete Hunched Beam with Multi-Opening has been developed as an alternative to steel structural elements. The commercial finite element package ABAQUS/CAE version 2019 has been utilized. This article has presented the results of three-dimensional numerical simulations investigating the flexural behaviour of existing experimental work of supported Prestressed Concrete Hunched Beams with multiple openings of varying shapes under static monotonic loads. Insertion openings in such a beam lead to concentrate stresses at the corners of these openings; as a result, extensive cracking would appear. Correlation between numerical models and empirical work has also been discussed regarding load displacemen
... Show More