Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
A novel planar type antenna printed on a high permittivity Rogers’ substrate is proposed for early stage microwave breast cancer detection. The design is based on a p-shaped wide-slot structure with microstrip feeding circuit to eliminate losses of transmission. The design parameters are optimized resulting in a good reflection coefficient at −10 dB from 4.5 to 10.9 GHz. Imaging result using inhomogeneous breast phantom indicates that the proposed antenna is capable of detecting a 5 mm size cancerous tumor embedded inside the fibroglandular region with dielectric contrast between the target and the surrounding materials ranging from 1.7 : 1 to 3.6 : 1.
Epithelial ovarian cancer is the leading cause of cancer deaths from gynecological malignancies. Angiogenesis is considered essential for tumor growth and the development of metastases. VEGF and IL?8 are potent angiostimulatory molecules and their expression has been demonstrated in many solid tumors, including ovarian cancer.VEGF and IL-8 concentrations were measured by ELISA test (HumanVEGF,IL-8). Bioassay ELISA/ US Biological / USA).The median VEGF and IL-8 levels were significantly higher in the sera of ovarian cancer patients than in those with benign tumors and in healthy controls.Pretreatment VEGF and IL-8 serum levels might be regarded as an additional tool in the differentiation of ovarian tumors.
98 samples were collected from various clinical sources included (Burns, wounds, urines, sputums, blood) From the city of Baghdad, After performing the biochemical and microscopic examination, 52 isolates were obtained for Pseudomonas aeruginosa, 17 (32.7%) isolates from burn infection, 12 (23%) isolates from Wound infection 11 (21.2%) isolates from urine infection, 7 (13.5%) isolates of sputum and 5 (9.6%) isolates from blood. Bacteria susceptibility to form biofilm has been detectedby microtiter plate method, The results showed that 80% of the bacterial isolates were produced the biofilm with different proportions, alg D gene (alginate production) has been detected by polymerase chain reaction (PCR) Which plays an essential role in the fo
... Show MoreDiarrhea is a real disease in childhood which could cause death. Therefore, this study was conducted to isolate Salmonella from 350 stool samples taken from children under five years in age, suffering from diarrhea during the period from March 2019 to March 2020 in Tikrit city / Iraq. The results showed the possibility to isolate ten isolates of Salmonella enterica subsp. Enterica, an infection rate, represents 2.875% of the total rate of patients who suffer from diarrhea. The virulence genes were investigated for ten isolates of S. enterica subsp. enterica, the result is that all isolates possessed the genes stn, invA, lpfA with an appearance percentage of 100%, whi
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreLately great interests have emerged to find educational alternatives to teach and improve motor skills according to modern educational methods that take into account individual differences and speed in learning for the learner through individual learning that the learner adopts by teaching himself by passing through various educational situations to acquire skills and information in the way he is The learner is the focus of the educational process and among these alternatives the interactive video, the researchers noted through the educational training units at the Model Squash School of the Central Union, and that most of the methods and methods used in learning basic skills take a lot of time in the educational program and do not involve
... Show MoreThe objective of all planning research is to plan for human comfort and safety, and one of the most significant natural dangers to which humans are exposed is earthquake risk; therefore, earthquake risks must be anticipated, and with the advancement of global technology, it is possible to obtain information on earthquake hazards. GIS has been utilized extensively in the field of environmental assessment research due to its high potential, and GIS is a crucial application in seismic risk assessment. This paper examines the methodologies used in recent GIS-based seismic risk studies, their primary environmental impacts on urban areas, and the complexity of the relationship between the applied methodological approaches and the resulting env
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima
This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.