The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present study proposes the use of a hybrid image segmentation technique to acquire precise segmentation outcomes, while engaging “Alpha Shape (α-Shape)” in supposition to derive the original contour, followed by a refining process through engaging a conventional active contour model. Empirical results show high potential in the suggested computational method. Trials indicate that the primary contour is capable of being precisely set next to the objective contour and effectively have these objective contours extracted, devoid of any contour instigation. Some of the benefits associated with the novel hybrid contour include minimized cost of computation, enhanced anti-jamming capability, as well as enlarged utilization array of snake model.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreKE Sharquie, AA Noaimi, EA Al-Janabi…, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 13
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
In this research, a variable stiffness actuator is proposed to enhance the damping of the mechanical vibrating system. The frequency response analysis of the vibrating system is dependant in order to analyze and synthesis this semi-active damping, where the suggested process is using active filter to estimate the present frequency of the vibration system, and this will limit the value of the stiffness of the vibrated system. Two active filter s are needed, low-pass-filter (LPF) to choose the higher stiffness of the actuator at small frequencies as well as more damping and high-pass-filter (HPF) to choose the lower stiffness of the actuator at high frequencies as well as more damping, and so
... Show MoreBackground: Chronic otitis media (COM) of mucosal or squamous type is a common problem in otolaryngology practice, the active form of COM is characterized by discharge of pus and is treated by antibiotics to start with, the appropriate antibiotic should be prescribed to avoid antibiotic abuse and guarantee good outcome. Objectives:The objective of this study is to identify the causative organisms of active chronic active otitis media both (mucosal, squamous) type and test their sensitivity to various anti- microbial agents &compare with abroad studies.Methods:A prospective study was done on eighty patients, different ages and sexes were taken and carful history and examination was done, examination under microscope was done with carf
... Show MoreThis research investigated the effect of adding two groups of reinforcement materials, including bioactive materials Hydroxyapatite (HA) and halloysite nanoclay and bioinert materials Alumina (AL2O3) and Zirconia (ZrO2), each of them with various weight ratios (1,2,3,4 &5)% to the polymer matrix PMMA. The best ratios were selected, and then a hybrid was preparing Composite red from the best ratios from each group. Thermal properties, including thermal conductivity and Thermomechanical Analysis (TMA) technology, have been studied. The results showed that adding 3% Hydroxyapatite (HA) and 5% halloysite nanoclay to the polymethacrylate (PMMA) mer leads to an increase in thermal conductivity. It was also found from the Thermomechanical Analysis
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show More