The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present study proposes the use of a hybrid image segmentation technique to acquire precise segmentation outcomes, while engaging “Alpha Shape (α-Shape)” in supposition to derive the original contour, followed by a refining process through engaging a conventional active contour model. Empirical results show high potential in the suggested computational method. Trials indicate that the primary contour is capable of being precisely set next to the objective contour and effectively have these objective contours extracted, devoid of any contour instigation. Some of the benefits associated with the novel hybrid contour include minimized cost of computation, enhanced anti-jamming capability, as well as enlarged utilization array of snake model.
Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreImproved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
Objective. Infection with Coxsackie virus. This virus that damages pancreatic cells, has long been linked to the onset of insulin-dependent diabetic mellitus (IDDM). Pro-inflammatory cytokines can be produced as a result of this illness. Tumor necrosis factor-a is one of these pro-inflammatory cytokines. Materials and Methods. Blood sample were collected from 180 Iraqi participants. Ninety of them is type 1 diabetic patients and other 90 is healthy control .both groups were tested for the incidence of Coxsackie virus B IgG. So the patients groups is divided to two groups according to sero positivity of CVB-IgG .all 180 patients tested to measure of level of TNF-α. Results. The Results showed increasing in levels of TNF-α in CBV po
... Show MoreChronic inflammation can induce proliferative events and posttranslational DNA modifications in prostate tissue through oxidative stress. The present study was designed to evaluate the changes in serum levels of TNF-α, malomdialdehyde (MDA) and total antioxidant status (TAS) patients with different stages of malignant prostatic cancer (PCa) and benign prostatic hyperplasia (BPH). One hundred males (age range of 58-72 years) with different stages of malignant PCa were recruited from the Radiotherapy and Nuclear Medicine Teaching Hospital in Baghdad during the period from September 2010 to April 2011. The patients were categorized according to the 4 disease stages (I, II, III, and IV); 25 patients with benign prostatic hyperplasia (BPH)
... Show MoreKE Sharquie, AA Noaimi, BO Saleh, ZN Anbar…, Saudi Med J, 2009 - Cited by 13
Lead toxicity elicits neurological damage which is a well-known disorder that has been considered to be a major cause for multiple condition such as behavioral defect; mental retardation; and nerve insufficient activity.
This research is designed to estimate potential protective effect of vinpocetine on neurotoxicity stimulated by lead acetate in rats.
Eighteen adult rats of both sexes were randomly enrolled into three groups. Each group includes 6 rats as followings: Group I- Rats were given 0.3ml normal saline solution orally; then intraperitoneal injection of 100μl of the normal saline was given 1h later; this group was considered as control. Group II- Rats were given an intraperitoneal injection of 20mg/kg lead acetate
... Show MoreBaghdad city has been faced numerous issues related to freshwater environment deteriorations due to many reasons, mainly was the discharge of wastewater without adequate treatment. Al-Rustamiya Wastewater Treatment Plant (WWTP) have been constructed among many plants in Baghdad city to reduce the amount of wastewater discharged into natural environment and its subsequent adverse effects. This study was conducted to evaluate the performance of the plant which consist of a conventional activated sludge (CAS) and sequencing batch reactors (SBR) systems as secondary treatment units and its ability to meet Iraqi specifications. A reliability level determination and analysis also were conducted to find the plant's stability an
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More