The growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to computed and recognized dependably. In this paper, we target to utilized CNN and heatmap to recognized most significant features that the network should focus on it. depending on class activation mapping. The goal of this study is to develop an approach that can determine the most significant features from medical images (such as x-ray, CT, MRI) through gradient the different tissue accurately by made use of heatmap. In our model, we take the gradient with regard to the final convolutional layer and after that weigh it towards the output of this layer. The model is based upon class activation mapping. However, the model is differed from traditional activation mapping based methods, that this model is the dependent on gradients via obtaining the weight of all activation map via make use of it is forward passing score over target class, then the final result is apart from linear combination of activation and weights. The results appears that the model is successfully distortion heat map of tissues in various medical image techniques and obtained better visual accuracy and fairness for interpretation the decision-making procedure.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show MoreDespite recent attempts to improve safety in the construction sector, this sector is considered dangerous and unsafe. Iraq is one of the emerging nations that suffers from a lack of construction safety management. In 2018, the construction sector in Iraq was responsible for 38% of all industrial accidents. Creating a safety program minimizes this problem by making safety an intrinsic part of construction projects. As a result, this article aims to identify the crucial safety factors that affect the safety performance in Iraqi construction projects. After conducting a critical literature review of the related literature, a list of 35 sub-factors classified into nine categories of main factors was chosen to rank each facto
... Show MoreDeep learning (DL) plays a significant role in several tasks, especially classification and prediction. Classification tasks can be efficiently achieved via convolutional neural networks (CNN) with a huge dataset, while recurrent neural networks (RNN) can perform prediction tasks due to their ability to remember time series data. In this paper, three models have been proposed to certify the evaluation track for classification and prediction tasks associated with four datasets (two for each task). These models are CNN and RNN, which include two models (Long Short Term Memory (LSTM)) and GRU (Gated Recurrent Unit). Each model is employed to work consequently over the two mentioned tasks to draw a road map of deep learning mod
... Show MoreIn all applications and specially in real time applications, image processing and compression plays in modern life a very important part in both storage and transmission over internet for example, but finding orthogonal matrices as a filter or transform in different sizes is very complex and importance to using in different applications like image processing and communications systems, at present, new method to find orthogonal matrices as transform filter then used for Mixed Transforms Generated by using a technique so-called Tensor Product based for Data Processing, these techniques are developed and utilized. Our aims at this paper are to evaluate and analyze this new mixed technique in Image Compression using the Discrete Wavelet Transfo
... Show MoreAlzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show More
Atheism is one of the most dangerous absurd doctrines that have swept the world in the modern era. Its strength lies in the bodies that stand behind it and adopt its ideologies which are accompanied by the tremendous media momentum of the theses of its supporters based on scientific and non-scientific levels. And since the denial of the existence of the Creator is the main focus and central point which the atheists based their view towards the universe, life and man, this humble research came to discuss the claim of the existence of the world by pure chance, and try to explain this scientifically through the theory of natural selection and survival of the fittest developed by the English biologist Charles Darwin. The resea
... Show MoreThis research aims to clarify and define the most important philosophical and rhetorical concepts to which many philosophical and rhetorical issues refer، since they have an effective role in the diversity and difference of intellectual schools، which are indispensable in proving major dogmatic issues، such as the concept of (existence، being، essence، and authenticity). Existence or Essence in contrast to the consideration of the other concept)، because it is one of the complex concepts and common words that carry different connotations among thinkers.
And from (the rule of judging something is a branch of its perception)، the researchers began to define these concepts، as evidence of the sincerity of perce
... Show More