Preferred Language
Articles
/
GxZ4BYcBVTCNdQwC8C8E
ULTRA-WIDEBAND FEATURING ENHANCED DELAY AND SUM ALGORITHM AND ORIENTED FOR DETECTING EARLY STAGE BREAST CANCER
...Show More Authors

Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, the proposed algorithm is effective in reducing the clutter and producing better images. Overall, the methods and procedures registered a signal-to-clutter ratio (SCR) value of 1.54 dB when imaging the most challenging example involving the heterogeneously dense model in 8-antenna geometry

Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Cancer Patients’ Experiences and Understanding of Venous Thromboembolism
...Show More Authors

Background: Venous thromboembolism (VTE), comprising deep vein thrombosis (DVT) and pulmonary embolism (PE), presents an extra challenge in the management of patients with cancer, given the increase in morbidity and mortality in having both conditions. Cancer patients are well known to have a high risk of VTE; particularly; those who have had major surgery, chemotherapy and/or hormonal therapy. These groups of patients need to understand the risk factors and the prophylactic measures to prevent developing VTE. This review aims to provide an overview of the literature on cancer patients’ understanding of VTE and their experiences of cancer-associated thrombosis (CAT).

Method: A scoping review wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Veterinary World
Therapeutic uses of epicatechin in diabetes and cancer
...Show More Authors

View Publication Preview PDF
Scopus (96)
Crossref (91)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Pathology - Research And Practice
Artificial intelligence in cancer diagnosis: Opportunities and challenges
...Show More Authors

View Publication
Scopus (31)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Karbala Journal Of Medicine
Assessment Of Her-2/Neu Gene Amplification Status by Chromogenic in Situ Hybridization in Breast Cancer Patients with Equivocal 2+ Her-2/Neu Immunostaining and Its Relation to The Clinic Pathological Parameters
...Show More Authors

background: human epidermal growth factor receptor-2 (her2/neu) is related to growth factor receptors with alkaline kinase activity and it is regarded as important prognostic and therapeutic factor that can depended on in breast cancer therapy. HER2/neu expression by immunohistochemistry (IHC) is submitted to a great in terob server inconsistency. Subsequently additional confirmatory tests for assessment of gene alterations and amplification status are needed for patients with early or metastatic breast cancer. In situ hybridization techniques and specifically Chromogenic in situ hybridization (CISH) was arise as a practical, cost-effective, and alternative to fluorescent in situ hybridization in testing for gene alterationAims of the study

... Show More
View Publication Preview PDF