Preferred Language
Articles
/
-hhmJZcBVTCNdQwCTZUA
Sustainable Utilization of Machine-Vision-Technique-Based Algorithm in Objective Evaluation of Confocal Microscope Images
...Show More Authors

Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and estimation. The current method (visual quantification methods) of image quantification is time-consuming and cumbersome, and manual measurement is imprecise because of the natural differences among human eyes’ abilities. Subsequently, objective outcome evaluation can obviate the drawbacks of the current methods and facilitate recording for documenting function and research purposes. To achieve a fast and valuable objective estimation of fluorescence in each image, an algorithm was designed based on machine vision techniques to extract the targeted objects in images that resulted from confocal images and then estimate the covered area to produce a percentage value similar to the outcome of the current method and is predicted to contribute to sustainable biotechnology image analyses by reducing time and labor consumption. The results show strong evidence that t-designed objective algorithm evaluations can replace the current method of manual and visual quantification methods to the extent that the Intraclass Correlation Coefficient (ICC) is 0.9.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The aesthetic images in Mohammed Thanoun graphic
...Show More Authors

The tagged search (The aesthetic images in Mohammed Thanoun graphic) four chapters, Chapter I was concerned the statement of the research problem, the research importance and it’s needed, the goal of research in identifying the aesthetic images in the graphic of the artist's, the research limits, and identifying the most important terms, chapter II came with theoretical framework and included three chapters: chapter I was interested in the aesthetic concept. chapter II is the image aesthetic in the graphic, and chapter III is the artist experience, Chapter III specializes in research procedures: community, sample, curriculum, tool, and sample analysis. Chapter IV ended with results, including: dynamic research sample illustrated of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A Vision to development the Islamic banks that operating under the financial system based on interest: (Iraq Case Study)
...Show More Authors

This paper aims to build a modern vision for Islamic banks to ensure sustainability and growth, as well it aims to highlight the positive Iraqi steps in the Islamic banking sector. In order to build this vision, several scientific research approaches were adopted (quantitative, descriptive analytical, descriptive). As for the research community, it was for all the Iraqi private commercial banks, including Islamic banks. The research samples varied according to a diversity of the methods and the data availability. A questionnaire was constructed and conducted, measuring internal and external honesty. 50 questionnaires were distributed to Iraqi academic specialized in Islamic banking. All distributed forms were subject to a thorough analys

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Ultra Wideband Cognitive Network Objective Issues
...Show More Authors

Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Performance Evaluation Based on Multi-UAV in Airborne Computer Network System
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu May 31 2012
Journal Name
Journal Of Baghdad College Dentistry
An evaluation of water absorption of Giomer in comparison to other resin-based restorative materials
...Show More Authors

Background: Polymeric composites have been widely used as dental restorative materials. A fundamental knowledge and understanding of the behavior of these materials in the oral cavity is essential to improve their properties and performance. The goal of this study was to measure water sorption of four composite resins containing different filler and resin matrix contents. Materials and method: Resin composite specimens giomer (Beautifil II) Filtek™ P90, Filtek™ Z350 XT, and Tetric N Ceram were prepared in a cylindrical mould of 3mm thickness and 6mm diameter (n=10) and light cured . All specimens placed in silica-gel desiccators at 37˚C for seven days, a constant weight was obtained. All samples were immersed in deionized distill

... Show More
Publication Date
Wed May 04 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Dextran Production From Locally Isolated Bacteria (Leuconostoc mesenteroides) And Its Utilization In Some Food Application: Dextran Production From Locally Isolated Bacteria (Leuconostoc mesenteroides) And Its Utilization In Some Food Application
...Show More Authors


Leuconostoc bacteria was isolated from local pickled cabbage (Brassica oleracea capitata) and identified as Leuconostoc mesenteroides by morphology,biochemical and physiological. The local isolated L. mesenteroides bacteria under the optimal conditions of dextran production showed that, the highly production of dextran was 7.7g achieved by using a modified natural media comprised of 100ml whey, 10g refined sugar, 0.5g heated yeast extract, 0.01g CaCl2, 0.001g MgSO4, 0.001g MnCl2 and 0.001g NaCl at pH 6 and 25̊C for 24 hr of fermentation and by using 1ᵡ106 cell/ml as initial inoculums volume. Some applications in food technology (Ice cream, Loaf, Ketchup and Beef preservation) have been performed with processed dextran. The result

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (20)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Life Sciences
Synthesis, characterization and anticancer activity in vitro evaluation of novel dicyanoaurate (I)-based complexes
...Show More Authors

View Publication
Crossref (4)
Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimation of parameters of two-dimensional sinusoidal signal model by employing Deferential Evaluation algorithm and the use of Sequential approach in estimation
...Show More Authors

Estimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model  in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling  the Symmetric gray scale texture image and estimating by using

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Evaluation of Electromagnetic Near-Field Measurement Technique as Non-Destructive Testing for Composite Structures
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref