Features are the description of the image contents which could be corner, blob or edge. Scale-Invariant Feature Transform (SIFT) extraction and description patent algorithm used widely in computer vision, it is fragmented to four main stages. This paper introduces image feature extraction using SIFT and chooses the most descriptive features among them by blurring image using Gaussian function and implementing Otsu segmentation algorithm on image, then applying Scale-Invariant Feature Transform feature extraction algorithm on segmented portions. On the other hand the SIFT feature extraction algorithm preceded by gray image normalization and binary thresholding as another preprocessing step. SIFT is a strong algorithm and gives more accura
... Show MoreImage segmentation is a basic image processing technique that is primarily used for finding segments that form the entire image. These segments can be then utilized in discriminative feature extraction, image retrieval, and pattern recognition. Clustering and region growing techniques are the commonly used image segmentation methods. K-Means is a heavily used clustering technique due to its simplicity and low computational cost. However, K-Means results depend on the initial centres’ values which are selected randomly, which leads to inconsistency in the image segmentation results. In addition, the quality of the isolated regions depends on the homogeneity of the resulted segments. In this paper, an improved K-Means
... Show MoreInformation is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency
... Show MoreLet R be a commutative ring with unity. And let E be a unitary R-module. This paper introduces the notion of 2-prime submodules as a generalized concept of 2-prime ideal, where proper submodule H of module F over a ring R is said to be 2-prime if , for r R and x F implies that or . we prove many properties for this kind of submodules, Let H is a submodule of module F over a ring R then H is a 2-prime submodule if and only if [N ] is a 2-prime submodule of E, where r R. Also, we prove that if F is a non-zero multiplication module, then [K: F] [H: F] for every submodule k of F such that H K. Furthermore, we will study the basic properties of this kind of submodules.
The dangerous and potentially blinding condition known as Acanthamoeba keratitis is caused by free-living amoebae of the genus Acanthamoeba. The prevalence of AIDS patients and contact lens wearers has increased in recent years, making cannaeba infections more significant. It's interesting to note that, depending on the parasite, host, and environmental conditions, the pathways linked to Acanthamoeba pathogenesis are frequently extremely complex. Notwithstanding our progress in antibiotic therapy and supportive care, the prevalence of Acanthamoeba keratitis has not decreased
The ability of microorganisms to attach to living and non-living surfaces and create a biofilm is the cause of numerous long-lasting illnesses, as well as their strong resistance to drugs. Bacterial biofilms consist of intricate assemblies of immobile bacteria. These are located in an extracellular matrix and adhere to various surfaces for a long period. The present study evaluated the antibacterial effectiveness of Plantago major extract against Staphylococcus aureus biofilm. The specimens analyzed in this investigation were skin infections of clinical origin. The current study was not previously studied, particularly in terms of S. aureus biofilm breakdown and inhibition. The disc diffusion method was used to test the antimicrobial activi
... Show MoreWell-dispersed Cu2FeSnSe4 (CFTSe) nanoparticles were first synthesized using the hot-injection method. The structure and phase purity of as-synthesized CFTSe nanoparticles were examined by X-ray diffraction (XRD) and Raman spectroscopy. Their morphological properties were characterized by scanning electron microscopy (SEM) and transmission electron microscopy (TEM). The average particle sizes of the nanoparticles were about 7-10 nm. The band gap of the as-synthesized CFTS nanoparticles was determined to be about 1.15 eV by ultraviolet-visible (UV-Vis) spectrophotometry. Photoelectrochemical characteristics of CFTSe nanoparticles were also studied, which indicated their potential application in solar energy water splitting.
This study deals with the processing of field seismic data for a seismic line located within the administrative boundaries of Najaf and Muthanna governorates in southern Iraq (7Gn 21) with a length of 54 km. The study was conducted within the Processing Department of the Oil Exploration Company using the Omega system, which contains a large number of programs that deal with processing, through the use of these programs applied predictive deconvolution of both( gap) and (spike). The final section was produced for both types. The gap predictive deconvolution gave improvement in the shallow reflectors while in deep reflectors it did not give a good improvement, thus giving a good continuity of the reflectors at
... Show Moreفي هذه المقالة ، يتم فحص تأثير متغير الدوران والمتغيرات الأخرى على التدفق التمعجي لسائل Powell-Eyring في قناة غير متماثلة مائلة مع مجال مغناطيسي مائل عبر وسط مسامي مع نقل الحرارة. يُفترض الطول الموجي الطويل وعدد رينولدز المنخفض ، حيث يتم استخدام نهج الاضطراب لحل المعادلات الحاكمة غير الخطية في نظام الإحداثيات الديكارتية لإنتاج حلول متسلسلة. يتم التعبير عن توزيعات السرعة وتدرجات الضغط رياضيًا. من خلال جمع الأرقام
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreA food chain model in which the top predator growing logistically has been proposed and studied. Two types of Holling’s functional responses type IV and type II have been used in the first trophic level and second trophic level respectively, in addition to Leslie-Gower in the third level. The properties of the solution are discussed. Since the boundary dynamics are affecting the dynamical behavior of the whole dynamical system, the linearization technique is used to study the stability of the subsystem of the proposed model. The persistence conditions of the obtained subsystem of the food chain are established. Finally, the model is simulated numerically to understand the global dynamics of the food chain un
... Show MoreIn this paper, the interplay among four population species is offered. The system consists of two competitive prey, predator and super predators. The application of the hypothesis of the Sotomayor theorem for local bifurcation around every equilibrium point is adopted. It is detected that the transcritical bifurcation could occur near most of the system's equilibrium points, while saddle-node and pitchfork bifurcation can not be accrued at any of them. Further, the conditions that guarantee the accruing Hopf bifurcation are carried out. Finally, some numerical analysis is illustrated to confirm the analytical results.
The Kumait Oil field was interpreted using 3-D seismic data from Oil Exploration company. The Shuaiba Formation (Cretaceous Age) reflector is detected.Structural map of formation is prepared to obtain the location and direction of the sedimentary basin and shoreline. Depth maps was drawn depending on the structural interpretation of the picked reflector and show several structural feature as closures.The seismic interpretation of the area approves the presence of some stratigraphic features in the studied formation. Some distributary mound and flatspot were observed within the study area, but they are not continuous due to the tectonic effects. These activity elements give reasonable explanation for the hydrocarbon distributi
... Show MoreIn the current study, 2D seismic data in west An-Najaf (WN-36 line) were received after many steps of processing by Oil Exploration Company in 2018. Surface Consistent Amplitude Compensation (SCAC) was applied on the seismic data. The processing sequence in our study started by sorting data in a common mid-point (CMP) gather, in order to apply the velocity analysis using Interactive Velocity Analysis Application (INVA) with Omega system. Semblance of velocity was prepared to preform normal move-out (NMO) vs. Time. Accurate root mean square velocity (VRMS) was selected, which was controlled by flatness of the primary events. The resultant seismic velocity section for the study area shows that the veloci
... Show MoreObjective: To assess the role of tumour necrosis factor alpha level and genotyping in susceptibility to leishmaniasis.Method: The case-control study was conducted from March to July 2021 at Baqubah Teaching Hospital, Diyala, Iraq,and comprised patients of cutaneous leishmaniasis in group A and healthy controls in group B. The serum level andsingle nucleotide polymorphisms of tumour necrosis factor-alpha rs41297589 and rs1800629 were compared betweenthe groups. Data was analysed using SPSS 28.Results: Of the 150 subjects, there were 75(50%) in group A; 39(52%) males and 36(48%) females with mean age23.91±13.14 years. The remaining 75(50%) subjects were in group B; 38(50.7%) males and 37(49.3%) females withmean age 22.84±4.35 years.
... Show MoreThis study is achieved in the local area of the Eridu oil field, where the Mishrif Formation is considered the main productive reservoir. The Mishrif Formation was deposited during the Cretaceous period in the secondary sedimentary cycle (Cenomanian-Early Turonian as a part of the Wasia Group, a carbonate succession widespread throughout the Arabian Plate.
The Mishrif Formation already have been evaluated in terms of depositional environments and their diagenetic processes. Here, it will test the previous conclusions with petrophysical properties delineated by using well logging. The results show there is a fully matching with two reservoir units (MA and MB). Dissolution and primary porosity are responsible for f
... Show MoreMWCNTs-OH was used to prepare a flexible gas sensor by deposition as a network on a filter cake using the method of filtration from suspension (FFS). The morphological and structural properties of the MWCNTs network were characterized before and after exposure to Freon gas using FTIR spectra and X-ray diffractometer, which confirmed that the characteristics of the sensor did not change after exposure to the gas. The sensor was exposed to a pure Freon134a gas as well as to a mixture of Freon gas and air with different ratios at room temperature. The experiments showed that the sensor works at room temperature and the sensitivity values increased with increasing operating temperature, to be 58% unt
... Show MoreThe process of accurate localization of the basic components of human faces (i.e., eyebrows, eyes, nose, mouth, etc.) from images is an important step in face processing techniques like face tracking, facial expression recognition or face recognition. However, it is a challenging task due to the variations in scale, orientation, pose, facial expressions, partial occlusions and lighting conditions. In the current paper, a scheme includes the method of three-hierarchal stages for facial components extraction is presented; it works regardless of illumination variance. Adaptive linear contrast enhancement methods like gamma correction and contrast stretching are used to simulate the variance in light condition among images. As testing material
... Show MoreIn this work, has been a studied the effect of thermal treatment using different annealing temperatures (373, 423 and 473) K in vacuum on structural and morphological properties of organic semiconductor Alq3:C60 thin films which are prepared by the spin coating on a glass, silicon and porous silicon. These films have been coated on substrates with speed of 2000 rpm. The structure properties of Tris(8-hydroxyquinoline) aluminum (III) (Alq3) and fullerene (C60) (100:1) and (100:10) blend as-deposited and treated have been studied by X-ray diffraction (XRD) for glass only and morphological properties by Atomic Force Microscope (AFM) for silicon and porous silicon substrates. The results of X
... Show MoreTen soil samples were collected from Ishaqi project area, Salah Al-Dean Governorate, and analysed for chemical elements (Fe2O3, Al2O3, CaO, K2O Na2O, Co, Zn, Cu, and Pb) to detect the pollution in the study soil using the indices of geo-accumulation (I-geo), contamination factor (CF), and pollution load index (PLI), The results of I-geo indicate that the soil of Ishaqi project area is unpolluted with Pb, Co and slightly polluted with Zn and Cu. The results of CF for Zn, Cu, and Co showed class 2 of moderate contamination and class 1 of low contamination in some samples while those for Pb demonstrated class 1 –of low contamination. The Pollution Load Index (PLI) values for Co, Zn, Cu, and Pb showed cla
... Show MoreThe prolactin hormone played role in the many autoimmune disorders. To determine the importance of high levels of prolactin in triggering rheumatoid arthritis, thirty patient's women with hyperprolactinemia aged (20-45) years old have been investigated and compared with twenty five healthy individuals. All the studied groups were carried out to measure the concentration of citrulinated peptide(CCP) by enzyme linked immunosorbent assay( ELISA), antikeratin antibodies (AKA)and antinuclear antibodies(ANA) by indirect fluorescent assay IFAT. There was a significant elevation of CCP concentration compared with control groups (P< 0.05). The percentage of antikeratin antibodies and antinuclear antibodies was (20%, 10%) respectively, and
... Show MoreWeibull distribution is one of the most widely used distributions of
lifetime in reliability engineering. It has the ability to provide reasonably
accurate failure analysis and failure forecasts especially with extremely
small samples. Bayesian approach has received a lot of attention along
with the traditional methods of estimation such as maximum likelihood
and moment estimation methods. The object of the present paper is to
compare some Bayes' estimators for the scale Parameter of the Weibull
reliability function using different loss functions, based on Jeffrey prior
information for estimating the scale parameter of Weibull distribution.
The comparison was based on a Monte Carlo study. Through the
simulat
The changes of the tectonic boundary locations between the stable and unstable shelf on different version of the tectonic maps of Iraq is discussed. It is found that the location of the boundary varies due to philosophy and the type of the geological parameters. It is used the stratigraphic, geophysical, structural, geochemical, hydrological and others information in delineating the boundary. The deep crustal structures obtained by using gravity data show that the boundary shifted toward the west by about 100 km in southern Iraq. According to the review, and when taking in consideration all the geological and geophysical parameters from the lower crust to the earth surface, it is believed that the boundary is not a line but it is a tecto
... Show MoreMulti-document summarization is an optimization problem demanding optimization of more than one objective function simultaneously. The proposed work regards balancing of the two significant objectives: content coverage and diversity when generating summaries from a collection of text documents.
Any automatic text summarization system has the challenge of producing high quality summary. Despite the existing efforts on designing and evaluating the performance of many text summarization techniques, their formulations lack the introduction of any model that can give an explicit representation of – coverage and diversity – the two contradictory semantics of any summary. In this work, the design of
... Show More