Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by using different tools and techniques. However, this paper presents a comprehensive review of the methods and techniques used to detect brain tumor through MRI image segmentation. Lastly, the paper concludes with a concise discussion and provides a direction toward the upcoming trend of more advanced research studies on brain image segmentation and Tumor detection.
The current research aims to validate the Effect of technical innovation on human resources management ambidexterity through job embeddedness. The current research was done in Al-Etihad Food Industries Co. Ltd. And within the industrial environment, the research was designed according to the descriptive research. And to achieve the main goal of the research above, the researcher used the questionnaire as a key instrument to collect data through the views of a sample of managers, and employees at the senior, middle and executive management level. The research sample reached (107) individuals, the data were analysed using the statistical packages (SPSS v. 26) and ( SMART PLS v 3. 3. 8) the group of statistical
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreSeven species of semi venomous Opisthoglypha snakes (Reptilia, Ophidia) of Iraq are listed with important characteristics in morphology due to geographical and individual variation of species, as well, the confusion in the scales count of Telescopus tessellatus martini (Schmidt, 1939) of Iraq are discussed.
Seven species of semi venomous Opisthoglypha snakes (Reptilia, Ophidia) of Iraq are listed with important characteristics in morphology due to geographical and individual variation of species, as well, the confusion in the scales count of Telescopus tessellatus martini (Schmidt, 1939) of Iraq are discussed.
Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreWith the growth of mobile phones, short message service (SMS) became an essential text communication service. However, the low cost and ease use of SMS led to an increase in SMS Spam. In this paper, the characteristics of SMS spam has studied and a set of features has introduced to get rid of SMS spam. In addition, the problem of SMS spam detection was addressed as a clustering analysis that requires a metaheuristic algorithm to find the clustering structures. Three differential evolution variants viz DE/rand/1, jDE/rand/1, jDE/best/1, are adopted for solving the SMS spam problem. Experimental results illustrate that the jDE/best/1 produces best results over other variants in terms of accuracy, false-positive rate and false-negative
... Show More