Preferred Language
Articles
/
ijp-476
Blood Vessels Detection of Diabetic Retinopathy from Retinal Fundus Image using Image Processing Techniques
...Show More Authors

 

Early detection of eye diseases can forestall visual deficiency and vision loss. There are several types of human eye diseases, for example, diabetic retinopathy, glaucoma, arteriosclerosis, and hypertension. Diabetic retinopathy (DR) which is brought about by diabetes causes the retinal vessels harmed and blood leakage in the retina. Retinal blood vessels have a huge job in the detection and treatment of different retinal diseases. Thus, retinal vasculature extraction is significant to help experts for the finding and treatment of systematic diseases. Accordingly, early detection and consequent treatment are fundamental for influenced patients to protect their vision. The aim of this paper is to detect blood vessels from the digital fundus images. In this research, a novel methodology was introduced to separate retinal blood vessel network. The suggested system in this research involves four stages, after image acquisition, the pre-processes of the image to preparing and improving the image quality is the first stage. Morphological operations are used for the detection of blood vessels. In this research, we will use two morphological operations: erosion and dilation. These two operations have two inputs, a binary image, and a structuring element object. We will use two morphological processes (boundary extraction and top, bottom hat transform). Before these operations, we will use applying a canny edge detector technique to obtain the edges of the retina image. The technique is tried on shading retinal pictures acquired from STARE and DRIVE databases which are accessible on the web as well as the samples of retinal images were obtained from the digital camera from Ibn Al-Haytham specialist Hospital for Eye in Baghdad, Iraq. Good results and effective were obtained for blood vessel detected and extract

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formation Evaluation for Nasiriyah Oil Field Based on The Non-Conventional Techniques
...Show More Authors

The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:

  • Apparent resistivity Rwa
  • Rxo /Rt

   The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
Teaching techniques due to the Brain-based learning theory among math teachers
...Show More Authors

The purpose of the study is to identify the teaching techniques that mathematics' teachers use due to the Brain-based learning theory. The sample is composed of (90) teacher: (50) male, (40) female. The results have shown no significant differences between male and female responses' mean. Additionally, through the observation of author, he found a lack of using Brain-based learning techniques. Thus, the researcher recommend that it is necessary to involve teachers in remedial courses to enhance their ability to create a classroom that raise up brain-based learning skills.  

View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Printmaking Techniques to Enable People with Visual Impairment to Taste Print Artworks
...Show More Authors

The study aims to integrate the visually impaired people into the art connoisseur community through producing special print artworks to enable the visually impaired people to use their other senses to feel artworks by using artistic printing techniques through adding some prominent materials to the printing colors or making an impact that visually impaired people can perceive using their other senses. This study also aims to set up art exhibitions that display tangible works that can enable visually impaired people to feel artwork and understand its elements to enable them to feel it through other senses.
The study follows the experimental method, through using artistic printing techniques, which allow printing with prominent textur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Effect of alkaloid and phenolic extract administration oi Allium cepa L Ù  on some biochemical parameters of blood on albino mice
...Show More Authors

؛ ١٨his study male and female albino mice werdministr^d doses of alkaloid and phenolic extracts of Allium cepa at doses of( 25 ,50,100, 200) mg / kg of( body weight). males and females were divided into four groups and each croup comprised mice were injected intra^ritonially daily for one week and orally ٢٠٢ one month . After which animals were killed and the serum was separated for biochemical analysis (total blood suger, total protein , otal cholesterol). Results showed significant decrease ( p< 0,05) in the total blood suger and total cholesterol on the serum of both males and females and significant increase( p< 0,05) in the total serum protein of both males and females of the two types of injection and oral administr

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Occurrence of Quinolone-Resistance Genes in Ciprofloxacin-Resistant Salmonella Enterica Serotype Typhi Isolated form Blood Sample of Patients with Typhoid Fever
...Show More Authors

 

Salmonella is approved as a common foodborne pathogen, causing major health problems throughout the world particularly in low‐ and middle‐income countries. Low-level fluoroquinolone resistance is conferred by both chromosomal and plasmid-encoded resistance, this research was carried out look into the occurrence rate of qnrA,qnrB and qnrS genes  in  Salmonella enterica serotype Typhi Cipr  ofloxacin-resistant insulate from blood samples of patients with typhoid fever. Fifteen Salmonella enterica serotype Typhi isolated previously from patients with typhoid fever were included in this study. All bacterial isolates were confirmed to have ciprofloxacin

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Synthesis of Ag/Au (core/shell) nanoparticles by laser ablation in liquid and study of their toxicity on blood human components
...Show More Authors
Abstract<p>Q-switch Nd: YAG laser of wavelengths 235nm and 1,460nm with energy in the range 0.2 J to 1J and 1Hz repetition rate was employed to synthesis Ag/Au (core/shell) nanoparticles (NPs) using pulse laser ablation in water. In this synthesis, initially the silver nano-colloid prepared via ablation target, this ablation related to Au target at various energies to creat Ag/Au NPs. Surface Plasmon Resonance (SPR), surface morphology and average particle size identified employing: UV-visible spectrophotometer, scanning electron microscopy (SEM) and transmission electron microscopy (TEM). The absorbance spectra of Ag NPs and Ag/Au NPs showed sharp and single peaks around 400nm and 410nm, respec</p> ... Show More
View Publication
Scopus (66)
Crossref (44)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Chemchemtech
LC-MS/MS METHOD FOR THE DETERMINATION OF IMATINIB MESYLATE IN BLOOD PLASMA SAMPLES AFTER ADSORPTION BY COPPER TANNIC ACID
...Show More Authors

A novel metal-organic framework (MOF) sorbent based on tannic acid/copper (TA/Cu) was synthesized and characterized for the application of the anticancer drug imatinib (IMA) from biological samples. The TA/Cu MOF was prepared via a facile coordination reaction and thoroughly characterized by SEM, XRD, and FTIR techniques. Critical parameters influencing the extraction efficiency of imatinib mesylate (IMAM), including pH, ionic strength, desorption solvent, and adsorption-desorption time were optimized. With acetonitrile as the desorption solvent, the method demonstrated a broad linear range of 0.55-300 μg L-1 under ideal conditions. Limits of detection and quantification were found to be 0.16 μg L-1 and 0.55 μg L-1, respectively.

... Show More
View Publication
Scopus (4)
Scopus Clarivate Crossref