In the present work, pattern recognition is carried out by the contrast and relative variance of clouds. The K-mean clustering process is then applied to classify the cloud type; also, texture analysis being adopted to extract the textural features and using them in cloud classification process. The test image used in the classification process is the Meteosat-7 image for the D3 region.The K-mean method is adopted as an unsupervised classification. This method depends on the initial chosen seeds of cluster. Since, the initial seeds are chosen randomly, the user supply a set of means, or cluster centers in the n-dimensional space.The K-mean cluster has been applied on two bands (IR2 band) and (water vapour band).The textural analysis is used where six parameters are calculated from the Co-occurrence matrix. These parameter were inserted in the K-mean. The best classifier feature is the angular second moment. When we use the angular second moment is used with any textural feature a good result were obtained for cloud classification, since the angular second moment gives indications on cloud homogeneity.
Shiranish Formation (Late Campanian- Maastrichtian) that cropping out north east Iraq, is studied by microfacies analysis of 52 thin section collected from Hijran Section, about 10 km west Shaqlawa Town, Governorate of Erbil. According to petrography, mineralogy and organic contents, rocks are subdivided to crystalline carbonate and microfacies units (biowackstone, packstone, and mudstone facies). Biowackstone facies have high ratio of the rock components, while the other facies have low ratio. Microfacies analysis led to relatively quiet deep marine environment.
Mycobacterium tuberculosis resistance to rifampicin is mainly mediated through mutations in the rpoB gene. The effects of rpoB mutations are relieved by secondary mutations in rpoA or rpoC genes. This study aims to identify mutations in rpoB, rpoA, and rpoC genes of Mycobacterium tuberculosis isolates and clarify their contribution to rifampicin resistance. Seventy isolates were identified by acid-fast bacilli smear, Genexpert assay, and growth on Lowenstein Jensen medium. Drug susceptibility, testing was performed by the proportional method. DNA extraction, PCR, and sequencing were accomplished for the entire rpoA, rpoB, and
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreOne of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system wit
... Show MoreOne of the diseases on a global scale that causes the main reasons of death is lung cancer. It is considered one of the most lethal diseases in life. Early detection and diagnosis are essential for lung cancer and will provide effective therapy and achieve better outcomes for patients; in recent years, algorithms of Deep Learning have demonstrated crucial promise for their use in medical imaging analysis, especially in lung cancer identification. This paper includes a comparison between a number of different Deep Learning techniques-based models using Computed Tomograph image datasets with traditional Convolution Neural Networks and SequeezeNet models using X-ray data for the automated diagnosis of lung cancer. Although the simple details p
... Show MoreThe efficiency of internal combustion engines (ICE) is usually about thirty percent of the total energy of the fuel. The residual energy is lost in the exhaust gas, the lubrication, and the cooling water in the radiators. Recently much of the researcher’s efforts have focused on taking advantage of wasted energy of the exhaust gas. Using a thermoelectric generator (TEG) is one of the promising ways. However, TEG depends entirely on the temperature difference, which may be offered by the exhaust muffler. An experimental test has been conducted to study the thermal performance of a different muffler internal design. The researchers resort to the use of lost energy in an ICE using TEG, which is one of the ways to take adv
... Show MoreBackground: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 149
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa
Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MoreRM Abbas, AA Abdulhameed, AI Salahaldin, International Conference on Geotechnical Engineering, 2010