Preferred Language
Articles
/
GxZ4BYcBVTCNdQwC8C8E
ULTRA-WIDEBAND FEATURING ENHANCED DELAY AND SUM ALGORITHM AND ORIENTED FOR DETECTING EARLY STAGE BREAST CANCER
...Show More Authors

Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, the proposed algorithm is effective in reducing the clutter and producing better images. Overall, the methods and procedures registered a signal-to-clutter ratio (SCR) value of 1.54 dB when imaging the most challenging example involving the heterogeneously dense model in 8-antenna geometry

Publication Date
Sun Jan 01 2017
Journal Name
البحوث التربويةوالنفسية
Preparing a teacher’s guide for computer books for the intermediate stage according to learning styles
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Ieee Access
Enhanced Spectral Efficiency in RIS-Assisted MIMO Systems Through Joint Precoding and RIS Configuration
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Originations for Teaching Physics at Secondary Stage main of the Educational Aims
...Show More Authors

Origination for Teaching Physics at Secondary Stage main of the Educational Aims

View Publication Preview PDF
Publication Date
Sun Jan 06 2013
Journal Name
Journal Of Educational And Psychological Researches
The reality of teaching performance materials for teachers of social primary stage
...Show More Authors


    The teacher is the most able to achieve the goals of education in education because he has the ability to affect the behavior of the disciples testified and its actions and appearance and other actions that convey pupils with it sometimes in a manner unconscious or unconscious , and the importance of the role of the teacher in the educational process , it is necessary to compromise the care and attention to the extent that commensurate with the important role that the rise in the preparation of youth and composition , and as a result is needed to continue efforts to improve the quality of teacher preparation so that it can be more effective and positive in the educational process .
First - Research Goals -<

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 25 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Block Matching Algorithm Using Mean and Low Order Moments
...Show More Authors

In this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Scheduling projects using dynamic programming style and smart algorithm
...Show More Authors

The aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.

It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Cancer Patients’ Experiences and Understanding of Venous Thromboembolism
...Show More Authors

Background: Venous thromboembolism (VTE), comprising deep vein thrombosis (DVT) and pulmonary embolism (PE), presents an extra challenge in the management of patients with cancer, given the increase in morbidity and mortality in having both conditions. Cancer patients are well known to have a high risk of VTE; particularly; those who have had major surgery, chemotherapy and/or hormonal therapy. These groups of patients need to understand the risk factors and the prophylactic measures to prevent developing VTE. This review aims to provide an overview of the literature on cancer patients’ understanding of VTE and their experiences of cancer-associated thrombosis (CAT).

Method: A scoping review wa

... Show More
View Publication Preview PDF
Crossref