Preferred Language
Articles
/
GxZ4BYcBVTCNdQwC8C8E
ULTRA-WIDEBAND FEATURING ENHANCED DELAY AND SUM ALGORITHM AND ORIENTED FOR DETECTING EARLY STAGE BREAST CANCER
...Show More Authors

Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, the proposed algorithm is effective in reducing the clutter and producing better images. Overall, the methods and procedures registered a signal-to-clutter ratio (SCR) value of 1.54 dB when imaging the most challenging example involving the heterogeneously dense model in 8-antenna geometry

Publication Date
Tue Jun 24 2025
Journal Name
Modern Sport
An analytical study of some of the deterministic variables of the stage of advancement and its relation to the accuracy of the performance of the skill of high jump correction
...Show More Authors

View Publication
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of the Educational Program to Develop Recall Habits of Late School Students in the Intermediate Stage
...Show More Authors

The research aimed to explore the recall habits and developing the right recall habits at middle school students. A sample of (40) students were chosen intentionally from middle school students in two schools (almntzr- zany aleabdyn) with an average of (20) students from each school. They were evenly distributed in two experimental and control groups. To achieve the aims of the research, a scale was designed to measure the recall habits, and a preparation of an educational program to develop recall habits.

To process data statistically, the researcher used several statistical methods such as Pearson correlation coefficient, chi-square, T-test for one sample, T-test for two independent samples, Wilcoxon test, Mann-Whitney test, ET

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Developing the Social Studies Curriculum at the Primary Stage in View of the Standards of the Next Generation
...Show More Authors

The aim of the current research is to develop the social studies curriculum at the primary stage in light of the standards of the next generation, which was represented in three main dimensions (pivotal ideas, scientific practices, and comprehensive concepts). The researcher designed a tool for the study, which is a content analysis card in the light of (NGSS) standards, based on the previous main dimensions. The descriptive analytical approach was adopted in analyzing the social studies curriculum for the primary stage to determine the degree to which the standards of the next generation are available, as well as to establish the theoretical framework related to the research variables. To develop the social studies curriculum in light o

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 11 2024
Journal Name
Lecture Notes In Civil Engineering
An Image Processing Algorithm to Address the Problem of Stains Merge on Water Sensitive Papers and Its Impact on the Evaluation of Spray Quality Indicators
...Show More Authors

There are many techniques that can be used to estimate the spray quality traits such as the spray coverage, droplet density, droplet count, and droplet diameter. One of the most common techniques is to use water sensitive papers (WSP) as a spray collector on field conditions and analyzing them using several software. However, possible merger of some droplets could occur after they deposit on WSP, and this could affect the accuracy of the results. In this research, image processing technique was used for better estimation of the spray traits, and to overcome the problem of droplet merger. The droplets were classified as non-merged and merged droplets based on their roundness, then the merged droplets were separated based on the average non-m

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lactic Acid Bacteria Biosurfactant Role That Isolated from Human Breast Milk in Inhibit Eyes Pathogenic Bacteria
...Show More Authors

     Biosurfactants have a wide-range of applications due to their unique properties like specificity, not toxicity (from LAB) and relative ease of preparation. These properties hold promise of biosurfactants to increase breast milk benefit were isolated and described into Lactobacillus plantarum, Lactobacillus fermentum ,Lactococcuslactis, and Leuconostocmesenteroides.The degree of microbial destruction of disease, which promotes  the effective remediation of disease spreading.This paper presents a review of available research, methods and publications regarding Biosurfactant extraction from Lactic Acid bacteria isolated from human breast milk. 3 samples of human breast milk was provid

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jan 14 2016
Journal Name
International Journal For Sciences And Technology
Evaluation of her/2-neu gene status using FISH/CISH techniques in Iraqi breast carcinoma patients
...Show More Authors

The present study aimed to examine the concordance between FISH/CISH techniques for assessment of amplification of her2neu gene in Iraqi breast carcinoma patients. Seventy four (74) Iraqi breast cancer patients were involved at the study from the Histopathology Department at the Central Public Health Laboratory in Bagdad, Iraq. Amplification of HER2neu was detected in (33.8%) by fluorescence in situ hybridization and (13.51%) showed high amplification by chromogenic in situ hybridization and (32.43%) showed low amplification. The results of chromogenic in situ hybridization were significantly correlated with the results of two-color fluorescence in situ hybridization with the same tumors. In addition, the study involved the correlation betw

... Show More
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More