Eye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through general description of these things. This paper utilizes these two principles to recognize and extract eye part from image. Java programming language and OpenCV library for image processing are used for this purpose. Good results are obtained from this proposed method, where 88.89% was obtained as a detection rate taking into account that the average execution time is about 0.23 in seconds.
Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreChronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a
... Show MoreTo determine the relationship between Helicobacter pylori infection and skin disorders, sixty six patients who suffering from skin diseases include chronic urticarial (CU) and atopic dermatitis (AD) who attended at Dermatological Clinic/ Al-Numan Teaching Hospital from the beginning of October 2015 to the end of January 2016 with age (6-62) have been investigated and compared to twenty two samples of apparently healthy individuals were studied as control group. All the studied groups were subjected to measurement of antiHelicobacter pylori IgG antibodies by enzyme linked immuno sorbent assay (ELISA) and detection of 16S rRNA and CagA genes by using singleplex and multiplex PCR methods. The results of current study revealed that there was a
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreType-1 diabetes is defined as destruction of pancreatic beta cell, virus and bacteria are some environmental factor for this disease. The study included 25 patients with type-1 diabetes mellitus aged between 8 – 25 years from Baghdad hospital and 20 healthy persons as control group. Anti-rubella IgG and IgM, anti-Chlamydia pneumonia IgG and IgM were measured by ELISA technique while anti-CMV antibody were measured by immunofluorescence technique. The aim of current study was to know the trigger factor for type-1 diabetes. There were significant differences (P<0.05) between studied groups according to parameters and the results lead to suggest that Chlamydia pneumonia, CMV and rubella virus may trigger type-1 diabetes mellitus in Iraqi pat
... Show MoreThe current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are absolute ethanol, 50% aqueous ethanol and water for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and
... Show MoreBackground: Staphylococcus spp. are widely distributed in nature and can cause nosocomial, skin infections, and foodborne illness, and it may lead to severe financial losses in birds by causing systemic infection in numerous organs. Aim: This study was conducted to determine the prevalence of Staphylococcus spp. in humans and birds in Baghdad city. Methods: Seventy-six oral cavity swabs were collected, including 41 from birds and 35 from breeders. All samples were examined by bacteriological methods and identified by using the VITEK technique, the samples were then further studied to test the ability of biofilm formation, and MDR factors and MAR index were tested with the use of seven antibiotics. Results: Among the 76 oral swa
... Show More