Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform well in certain medical image applications.The aim of this paper is to change the medical image into something that is more meaningful and easier to analyze and recognize features that helps the doctors to diagnoses the diseases .This paper views selected medical image and segmentation method that have been proposed, which are suitable for processing medical images by use the modification of the traditional interactive threshold technique. This method gave good results,and these results are testedaccordingto the measure of quality (PSNR).
This research had been achieved to identify the image of the subsurface structure representing the Tertiary period in the Galabat Field northeast of Iraq using 2D seismic survey measurements. Synthetic seismograms of the Galabat-3 well were generated in order to identify and pick the reflectors in seismic sections. Structural Images were drawn in the time domain and then converted to the depth domain by using average velocities. Structurally, seismic sections illustrate these reflectors are affected by two reverse faults affected on the Jeribe Formation and the layers below with the increase in the density of the reverse faults in the northern division. The structural maps show Galabat field, which consists of longitudinal Asymmetrical narr
... Show MoreNeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreThis research including lineament automated extraction by using PCI Geomatica program, depending on satellite image and lineament analysis by using GIS program. Analysis included density analysis, length density analysis and intersection density analysis. When calculate the slope map for the study area, found the relationship between the slope and lineament density.
The lineament density increases in the regions that have high values for the slope, show that lineament play an important role in the classification process as it isolates the class for the other were observed in Iranian territory, clearly, also show that one of the lineament hit shoulders of Galal Badra dam and the surrounding areas dam. So should take into consideration
ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013
Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreThis research investigates the adsorption isotherm and adsorption kinetics of nitrogen from air using packed bed of Li-LSX zeolite to get medical oxygen. Experiments were carried out to estimate the produced oxygen purity under different operating conditions: input pressure of 0.5 – 2.5 bar, feed flow rate of air of 2 – 10 L.min-1 and packing height of 9-16 cm. The adsorption isotherm was studied at the best conditions of input pressure of 2.5 bar, the height of packing 16 cm, and flow rate 6 Lmin-1 at ambient temperature, at these conditions the highest purity of oxygen by this system 73.15 vol % of outlet gas was produced. Langmuir isotherm was the best models representing the experimental data., and the m
... Show MoreThis presented study is to make comparison of cross sections to produce 71As, 72As, 73As and 74As via different reactions with particle incident energy up to 60 MeV of alpha 100 MeV of proton as a part of systematic studies on particle-induced activations on enriched Ge, Ga, Rb and Nb targets and neutron capture. Theoretical calculation of production yield, and suggestion of optimum reaction to produce 71As, 72As, 73As and 74As, based on the main published and approved experimental results of excitation functions were calculated.
The Coronavirus Disease 2019 (COVID-19) pandemic has caused an unprecedented disruption in medical education and healthcare systems worldwide. The disease can cause life-threatening conditions and it presents challenges for medical education, as instructors must deliver lectures safely, while ensuring the integrity and continuity of the medical education process. It is therefore important to assess the usability of online learning methods, and to determine their feasibility and adequacy for medical students. We aimed to provide an overview of the situation experienced by medical students during the COVID-19 pandemic, and to determine the knowledge, attitudes, and practices of medical students regarding electronic medical education.
... Show MoreIn this research, carbon nanotubes (CNTs) is prepared through the Hummers method with a slight change in some of the work steps, thus, a new method has been created for preparing carbon nanotubes which is similar to the original Hummers method that is used to prepare graphene oxide. Then, the suspension carbon nanotubes is transferred to a simple electrode position platform consisting of two electrodes and the cell body for the coating and reduction of the carbon nanotubes on ITO glass which represents the cathode electrode while platinum represents the anode electrode. The deposited layer of carbon nanotubes is examined through the scanning electron microscope technique (SEM), and the images throughout the research show the
... Show More