Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zigzag scan is applied on the quantized coefficients and the output are encoded using DPCM, shift optimizer and shift coding for DC while adaptive RLE, shift optimizer then shift coding applied for AC, the other subbands; LH, HL and HH are compressed using the scalar quantization, Quadtree and shift optimizer then shift coding. In this paper, a new flipping block with an adaptive RLE is proposed and applied for image enhancement. After applying DCT system and scalar quantization, huge number of zeros produced with less number of other values, so an adaptive RLE is used to encode this RUN of zeros which results with more compression.Standard medical images are selected to be used as testing image materials such as CT-Scan, X-Ray, MRI these images are specially used for researches as a testing samples. The results showed high compression ratio with high quality reconstructed images
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreObjective: The objectives of the present study were to evaluate the effectiveness of the instructional intervention
about medical and health knowledge of patients with diabetes mellitus type II.
Methodology: A Quasi- experimental study was carried out in National Center for Diabetes Mellitus/ Almustansria
University, started from 4th January 2012, to 1st April 2012. Non-probability (purposive sample) of (50) diabetes
mellitus type II, who visit National Center for Diabetes Mellitus/ Almustansria University. The study sample is
divided equally into (25) study and (25) control groups. The study group received the instructional intervention.
While the control not exposed to the instructional intervention. The data are coll
The aim of this study is to evaluate the anti fungal activity of a combination of essential oils against water molds. HPLC analysis was done to evaluate the quantity and quality of the active compounds in this combination which extracted from three herbs( Peppermint Menthapiperita ,Thyme Thymusvulgaris, Common sage Salvia officinalis L.) and the active compounds are Camphor,Menthol,,Thujone and Thymol with different concentrations. In this study (MIC) , (MFC) were measured and (LD50) determined after 48,96 h from fingerlings treatment of common carp in aquariums .The results of (MIC) were 0.025µl/ml for Aphanomyces sp. and 0.015µl/ml for both Achlya sp. and Fusariumsolani which showed significant differences(p<0.05) from Malachite gre
... Show MoreFire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA20
Recently emerging pandemic SARS CoV-2 conquered our world since December 2019. Continuous efforts have been done to find out effective immunization and precise treatment stetratigies A way from therapeutic options that were tried in SARS CoV-2, an increased attention is directed to predict natural products and mainly phytochemicals as collaborative measures for this crisis. In this review, most of the mentioned compounds specially flavonoids (biacalin, hesperidin, quercetin, luteolin,, and phenolic (resveratrol, curcumin, and theaflavin) exert their effect through interfering with the action of one or more of this proteins (spike protein, papain like protease, 3 chymotrypsin like cysteine protease, and RNA dependent RNA
... Show MoreIf feminist philosophy in the context of feminist research focuses on how to produce an alternative knowledge and culture for women and forming anew awareness of their roles in the face of prevailing misconceptions then the topic of Islamic feminism is presented as a philosophical topic in the field of human knowledge to discuss how to produce an alternative knowledge of traditional knowledge prevailing in patriarchal societies to restore the balance of power and authority in the relationship between the sexes to create an effective feminist role in advocating for and defending womenś issues to achieve this Islamic feminism sought to establish an Islamic epistemology .
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreFor many problems in Physics and Computational Fluid Dynamics (CFD), providing an accurate approximation of derivatives is a challenging task. This paper presents a class of high order numerical schemes for approximating the first derivative. These approximations are derived based on solving a special system of equations with some unknown coefficients. The construction method provides numerous types of schemes with different orders of accuracy. The accuracy of each scheme is analyzed by using Fourier analysis, which illustrates the dispersion and dissipation of the scheme. The polynomial technique is used to verify the order of accuracy of the proposed schemes by obtaining the error terms. Dispersion and dissipation errors are calculated
... Show MoreOrthophoto provides a significant alternative capability for the presentation of architectural or archaeological applications. Although orthophoto production from airphotography of high or lower altitudes is considered to be typical, the close range applications for the large-scale survey of statue or art masterpiece or any kind of monuments still contain a lot of interesting issues to be investigated.
In this paper a test was carried out for the production of large scale orthophoto of highly curved surface, using a statue constructed of some kind of stones. In this test we use stereo photographs to produce the orthophoto in stead of single photo and DTM, by applying the DLT mathematical relationship as base formula in differenti
... Show More