Computer-aided diagnosis (CAD) has proved to be an effective and accurate method for diagnostic prediction over the years. This article focuses on the development of an automated CAD system with the intent to perform diagnosis as accurately as possible. Deep learning methods have been able to produce impressive results on medical image datasets. This study employs deep learning methods in conjunction with meta-heuristic algorithms and supervised machine-learning algorithms to perform an accurate diagnosis. Pre-trained convolutional neural networks (CNNs) or auto-encoder are used for feature extraction, whereas feature selection is performed using an ant colony optimization (ACO) algorithm. Ant colony optimization helps to search for the bes
... Show MoreMedia plays an important role in shaping the mental image of their audiences for individuals, groups and organizations, States and peoples. It is the window through which overlooks the masses on events and issues, and in the light of their exposure to these means are their opinions and impressions.
Despite the importance of direct experiences in shaping opinions, drawing pictures and impressions, it is inevitable to rely on these means as individuals can not engage in direct experiences with thousands of events, issues and topics that concern their community and other societies.
There is no doubt that media is of great importance at the present time, because of its significant impact in the management of the course of pol
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThe purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju
... Show MoreThis study reports the formation, characterisation and biological evaluation of a Schiff base ligand and its corresponding metal complexes. The Schiff base ligand (HL) was prepared through a condensation reaction involving isonicotinohydrazide and N'-((1R,2R,4R,5S, E)-2,4-bis(4-chlorophenyl)-3-azabi cyclo[3.3.1]nonan-9-ylidene) isonicotinohydrazide (M) in EtOH solvent and (3-5) drops of conc. HCl. The interaction of HL with selected metal chlorides including Mn(+2), Co(+2), Ni(+2), Cu(+2) and Zn(+2) in a 2:1 (L:M) mole ratio resulted in the synthesis of complexes with the general formula [M(HL)Cl2] (where: M = Mn(+2),Co(+2) and Ni(+2)) and [M`(HL)Cl2] (where M` = Cu(+2) and Zn(+2)). The characterisation of the prepared compounds w
... Show MoreMetal complexes of Mn(II), Co(II), Ni(II), Cu(II), Cd(II), Zn(II), Hg(II), Pd(II), and Pt(II) with Schiff base ligand (LH) derived from 2,5-dichloroaniline and 2-hydroxy-5-metheylbenzalaldehyde were synthesized and characterized using a variety of spectrophotometric techniques The findings of the spectroscopic analysis indicated that (LH) behaved as a binary coordinating agent to the metal ion by the N and O atoms, and the geometry shape of the complexes was octahedral, with the exception of the Pd and Pt complexes, which had a square planar geometry. Using the DPPH radical scavenging method, we investigated the antimicrobial activity of the compound against Staphylococcus aureus and Escherichia coli, as well as the antifungal activity of t
... Show More