Detection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with
... Show MoreA case of angiolymphoid hyperplasia with eosinophilia (ALH) is reported in a 42-year-old woman who developed multiple nodules behind the ear. Angiolymphoid hyperplasia with eosinophilia usually occurs on the head and neck of young adults and is more common in women than in men. Characteristic histologic features of ALH present in this case included proliferation of thick-walled blood vessels lined by prominent endothelial cells, infiltration of the interstitium by chronic inflammatory cells (mainly eosinophils), and presence of lymphoid follicles with germinal centers. The patient referred for surgeon for complete excision. in this context , cases previously described in the literature, and the differential diagnosis of ALH are discussed
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe main challenge is to protect the environment from future deterioration due to pollution and the lack of natural resources. Therefore, one of the most important things to pay attention to and get rid of its negative impact is solid waste. Solid waste is a double-edged sword according to the way it is dealt with, as neglecting it causes a serious environmental risk from water, air and soil pollution, while dealing with it in the right way makes it an important resource in preserving the environment. Accordingly, the proper management of solid waste and its reuse or recycling is the most important factor. Therefore, attention has been drawn to the use of solid waste in different ways, and the most common way is to use it as an alternative
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreThe establishment of a high quality service in oral health care achieved by a member of dental professional is an important feature of any system of peer review in dentistry. This protocol attempts to discuss two crucial elements (I) suitability and feasibility of treatment modality and (II) quality of treatment performed to Iraqi patients. The Iraq endodontic society is designing a standardized protocol for endodontic treatment following the quality guidelines of European society of Endodontology (2006) to meet the highest standard of care generally given by competent practitioners. The Iraqi endodontic society has the expertise and professional responsibility clinically relevant to empower the dental profession through creating significan
... Show MoreExponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.
In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us
... Show MoreThis paper presents L1-adaptive controller for controlling uncertain parameters and time-varying unknown parameters to control the position of a DC servomotor. For the purpose of comparison, the effectiveness of L1-adaptive controller for position control of studied servomotor has been examined and compared with another adaptive controller; Model Reference Adaptive Controller (MRAC). Robustness of both L1-adaptive controller and model reference adaptive controller to different input reference signals and different structures of uncertainty were studied. Three different types of input signals are taken into account; ramp, step and sinusoidal. The L1-adaptive controller ensured uniformly bounded
... Show More