conventional FCM algorithm does not fully utilize the spatial information in the image. In this research, we use a FCM algorithm that incorporates spatial information into the membership function for clustering. The spatial function is the summation of the membership functions in the neighborhood of each pixel under consideration. The advantages of the method are that it is less
sensitive to noise than other techniques, and it yields regions more homogeneous than those of other methods. This technique is a powerful method for noisy image segmentation.
In the resent years, there is a robust scientific interest in discovery of new anti-septic and anti-oxidant naturally products with no/or limited side effects. The current study aimed to investigate the protective role of the quercetin on inflammations induced by lipopolysaccharide (LPS) in male mice A number of criteria included i.e. liver and spleen index and IL-6 and IL1-β cytokines level in spleen homogenate were considered. Sixty male mice (8-9 week age) was divided into six groups and treated for 5 days as the following: the first group represented control, the second and third group were injected with 5, 10 mg/kg b.w doses of quercetin respectively. While the fourth and fifth groups were co-treatment with (5, 10 mg/kg b.w.) intraper
... Show MoreThis study was carried out in Plant Tissue Culture Labs, College of Agricultural Engineering Sciences, University of Baghdad from November 2018 to June 2019. Fresh stem cuttings, 5 cm long were selected from 6-month old C-35 Citrange rootstock. Five concentrations of BA (0, 1, 1.5, 2 and 2.5 mg.L-1) were studied and addition of meta-Topolin (mT) at four concentrations (0, 1, 5 and 10 mg.L-1) was also studied to find out its effect individually on shoot number and shoot length in multiplication stage. Rooting media supplemented with four concentrations of IBA (0, 1, 2 and 3 mg.L-1) was also studied to find out its effect on rooting percentage, root number and root length. Results showed that BA as concentration of 2.5mg.L-1 significantly gav
... Show MoreThis research mainly aims to analyze local development strategy in Baghdad Governance, build the Strategic Model based on the study area's spatial interaction, and achieve the Trinity of Excellence based on the global model of excellence.
This research applied SWOT strategic analysis for the strengths and weaknesses of the internal environment and opportunities and threats of the external environment for the provincial council. In conclusion, the research specifies appropriate alternatives and choosing the best in line with the reality of the Baghdad Provincial Council. Also, the strategic goals in the national plan and the spatial interaction of the development goals,
... Show MoreThis study is designed to detect the level of cytokine IFN-γ concentration, and some antioxidants, including super oxide dismutase (SOD) and Vitamin C, and to estimate the level of sex hormones (FSH and LH), and to determine auto-antibodies (antiphospholipid antibodies (APA) IgG\IgM, and anticardiolipin antibodies (ACA) IgG\IgM) and to estimate the blood parameters in 51 miscarriage women infected with T.gondii distributed depending on the type of antibodies. Additionally, 39 volunteers non-infected with T.gondii included (19 miscarriage women, 10 pregnant women and 10 non-pregnant women). ELISA and spectrophotometer method were used in this study. The results of IFN-γ showed a significant increase)p<0.05) in the l
... Show MoreThe study focuses on assessment of the quality of some image enhancement methods which were implemented on renal X-ray images. The enhancement methods included Imadjust, Histogram Equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE). The images qualities were calculated to compare input images with output images from these three enhancement techniques. An eight renal x-ray images are collected to perform these methods. Generally, the x-ray images are lack of contrast and low in radiation dosage. This lack of image quality can be amended by enhancement process. Three quality image factors were done to assess the resulted images involved (Naturalness Image Quality Evaluator (NIQE), Perception based Image Qual
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreArtificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023