This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discusses the benefits and limitations of each technique, emphasizing their efficacy in addressing various kinds of images and the dares they face in complex environs. This article offers a comparative analysis of the numerous approaches utilized in edge detection, which assistances in selecting the suitable technique according to the requirements of applications, like video processing, object recognition, medical image analysis, and computer vision.
Linear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust
... Show MoreIn this research, we studied the multiple linear regression models for two variables in the presence of the autocorrelation problem for the error term observations and when the error is distributed with general logistic distribution. The auto regression model is involved in the studying and analyzing of the relationship between the variables, and through this relationship, the forecasting is completed with the variables as values. A simulation technique is used for comparison methods depending on the mean square error criteria in where the estimation methods that were used are (Generalized Least Squares, M Robust, and Laplace), and for different sizes of samples (20, 40, 60, 80, 100, 120). The M robust method is demonstrated the best metho
... Show MoreIn this research, we studied the multiple linear regression models for two variables in the presence of the autocorrelation problem for the error term observations and when the error is distributed with general logistic distribution. The auto regression model is involved in the studying and analyzing of the relationship between the variables, and through this relationship, the forecasting is completed with the variables as values. A simulation technique is used for comparison methods depending
This paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreIn Present study, 25 clinical isolates of Proteus spp. of clinical samples, urine, wounds and burns collected from different hospitals in Baghdad city, all isolates were identified as Proteus mirabilis using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifying as P. mirabilis. The susceptibility of P. mirabilis isolates to cefotaxime was 66.6 %, while to ceftazidime was 20%. Extended spectrum β-lactamses producing Proteus was 30.7 %. DNA of 5 isolates of P. mirabilis was extracted and detection for blaVEB-1 gene by using multiplex polymerase chain reaction (PCR). Results showed that the presence of this gene in all tested isolates, as an important indicator for increas
... Show MoreDiarrhea is a real disease in childhood which could cause death. Therefore, this study was conducted to isolate Salmonella from 350 stool samples taken from children under five years in age, suffering from diarrhea during the period from March 2019 to March 2020 in Tikrit city / Iraq. The results showed the possibility to isolate ten isolates of Salmonella enterica subsp. Enterica, an infection rate, represents 2.875% of the total rate of patients who suffer from diarrhea. The virulence genes were investigated for ten isolates of S. enterica subsp. enterica, the result is that all isolates possessed the genes stn, invA, lpfA with an appearance percentage of 100%, whi
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Background: Osteoporosis is denoted by low bone mass and microarchitectural breakdown of bone tissue, directing to increased fracture risk and bone fragility. Fractures may lead to a decreased quality of life and increased medical costs. Thus, osteoporosis is widely considered a significant health concern.
Objective. This study aimed to compare quantitative computed tomography (QCT) and dual-energy X-Ray absorptiometry (DXA) to detect osteoporosis in postmenopausal women.
Subjects and Methods. We measured spinal volumetric bone mineral density (BMD) with QCT and areal spinal and hip BMD with DXA in 164 postmenopausal women. We calculated the osteo
... Show More