In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.
The aim of the study is to detect the malignant conditions of the skin tumors through the features of optical images. This research included some of image processing techniques to detect skin cancer as a strong threat to human beings' lives. Using image processing and analysis methods to improves the ability of pathologists to detect this disease leading to more specified diagnosis and better treatment of them. One hundred images were collected from Benign and Malignant tumors and some appropriate image features were calculated, like Maximum Probability, Entropy, Coefficient of Variation, Homogeneity and Contrast, and using Minimum Distance method to separate these images. These features with Minimum Distance as a proposed making decision a
... Show MoreConstruction projects have become a changing dramatically in recent decades and that the goal of the beneficiaries of the implementation of structural project is to complete the work with less time and within the cost of the specific and the best possible quality may sometimes happen that highlights the importance of time on the rest of the items at the implementation of projects for various reasons, including the need to use the project as soon as possible possible change rapidly to customer's requests, but the high cost of the project represents the biggest obstacle for entrepreneurs with its effects on the quality and the time workers, and is a measure of those elements in monetary terms is the key to integration between them, so the
... Show MoreThis research aims to improve the radiation shielding properties of polymer-based materials by mixing PVC with locally available building materials. Specifically, two key parameters of fast neutron attenuation (removal cross-section and half-value layer) were studied for composite materials comprising PVC reinforced with common building materials (cement, sand, gypsum and marble) in different proportions (10%, 30% and 50% by weight). To assess their effectiveness as protection against fast neutrons, the macroscopic neutron cross-section was calculated for each composite. Results show that neutron cross-section values are significantly affected by the reinforcement ratios, and that the composite material PVC + 50% gypsum is an effect
... Show MoreBackground: Fast dissolving oral drug delivery system is solid dosage form which disintegrates or dissolves within second when placed in the mouth without need of water or chewing. In present investigation, an attempt has been made to develop oral fast dissolving film of calcium channel blocker lacidipine. Method: Five formulas were prepared by solvent casting method using HPMC (METOLOSE)® as a film forming polymer and evaluated for their physical characteristics such as thickness, weight variation, folding endurance, drug content, disintegration time and in vitro drug release. The compatibility of the drug in the formulation was confirmed by FTIR and DSC studies. Result and Conclusion: The optimized formula F1 showed minimum in vitr
... Show MoreThe Matching and Mosaic of the satellite imagery play an essential role in many remote sensing and image processing projects. These techniques must be required in a particular step in the project, such as remotely change detection applications and the study of large regions of interest. The matching and mosaic methods depend on many image parameters such as pixel values in the two or more images, projection system associated with the header files, and spatial resolutions, where many of these methods construct the matching and mosaic manually. In this research, georeference techniques were used to overcome the image matching task in semi automotive method. The decision about the quality of the technique can be considered i
... Show MoreThirty swabes of medical implants were collected from Al-Yarmouk's hospital which were cultured on manitole agar to isolate Staphelococcus aureus . Only four samples gave positive results with this media. It was used ten types of antibiotics to test the sensitivity of this bacterium against them. All isolates of S. aureus were recorded as multidrug resistant and were considered as MRSA. One pledge alternative therapy is the utilize of certain pure bacterocin MIC (32.5 to 62.5 μg/ml) and it was compared with vancomycin (200-400 μg/ml) with average of (8 – 15) mm diameter of inhibition zones recpectively. The first reduction of biofilm formation ability has been proved in catheters when treatedby pure bacterocin. The test shows the highes
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show More