Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, the proposed algorithm is effective in reducing the clutter and producing better images. Overall, the methods and procedures registered a signal-to-clutter ratio (SCR) value of 1.54 dB when imaging the most challenging example involving the heterogeneously dense model in 8-antenna geometry
The study aimed to evaluate the benefits of transferrin saturation percentage (TSAT) and serum ferritin in assessing body iron status, which can influence erythropoietin treatment in patients with ESRD. Forty end-stage renal disease patients on regular hemodialysis participated in this study. Clinical data were obtained. Serum iron, total iron binding capacity, transferrin saturation, ferritin, albumin, creatinine, and C-reactive protein were investigated. Thirty healthy people were enrolled as a control group. ESRD patients had a mean age of 45.1±13.9 years, with 60% being males. They exhibited significantly lower hematocrit (25.3±6.5%), and higher platelet (285.7±148.1x10^9/L) and WBC (9.4±3.1x10^9/L) counts compared to healthy contro
... Show MoreST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013
Heuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin
... Show MoreFlexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best
... Show MoreThis paper presents a study of the application of gas lift (GL) to improve oil production in a Middle East field. The field has been experiencing a rapid decline in production due to a drop in reservoir pressure. GL is a widely used artificial lift technique that can be used to increase oil production by reducing the hydrostatic pressure in the wellbore. The study used a full field model to simulate the effects of GL on production. The model was run under different production scenarios, including different water cut and reservoir pressure values. The results showed that GL can significantly increase oil production under all scenarios. The study also found that most wells in the field will soon be closed due to high water cuts. Howev
... Show MoreFibro-adenoma is the most common lesion of the breast, it occurs in25%of asymptomatic women (1,2 )
It is usually a disease of early reproductive life, the peak incidence is between the ages15 and 35 years.(3,4) It presents as firm highly mobile, non tender mass .(5)
Less than 5% of fibro-adenomas grow rapidly and display the clinical and histologic characteristics of giant fibro-adenoma which is defined as a-tumour either having a diameter greater than 5 cm. And /or amass weighing more than 500 grams, and are conventionally a benign tumor of breast.(6)
Giant fibro-adenomas appear as well-circumscribed but not encapsulated masses on mammography and solid and the texture is homogenous and hypoechoic with low level echoes on U/S. (
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More