Vision loss happens due to diabetic retinopathy (DR) in severe stages. Thus, an automatic detection method applied to diagnose DR in an earlier phase may help medical doctors to make better decisions. DR is considered one of the main risks, leading to blindness. Computer-Aided Diagnosis systems play an essential role in detecting features in fundus images. Fundus images may include blood vessels, exudates, micro-aneurysm, hemorrhages, and neovascularization. In this paper, our model combines automatic detection for the diabetic retinopathy classification with localization methods depending on weakly-supervised learning. The model has four stages; in stage one, various preprocessing techniques are applied to smooth the data set. In stage two, the network had gotten deeply to the optic disk segment for eliminating any exudate's false prediction because the exudates had the same color pixel as the optic disk. In stage three, the network is fed through training data to classify each label. Finally, the layers of the convolution neural network are re-edited, and used to localize the impact of DR on the patient's eye. The framework tackles the matching technique between two essential concepts where the classification problem depends on the supervised learning method. While the localization problem was obtained by the weakly supervised method. An additional layer known as weakly supervised sensitive heat map (WSSH) was added to detect the ROI of the lesion at a test accuracy of 98.65%, while comparing with Class Activation Map that involved weakly supervised technology achieved 0.954. The main purpose is to learn a representation that collect the central localization of discriminative features in a retina image. CNN-WSSH model is able to highlight decisive features in a single forward pass for getting the best detection of lesions.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show Morethe research goal is preparing a list of standard criteria and quality controls for information technology applications to serve the Holy Quran.
To achieve this goal, the researcher has built a list of criteria according to the following steps:
First - identify the key areas covered by the whole list which are:
1 – Standards of system building and implementing with the operating screens.
2 – Standards of display forms including audio and video presentation.
3 – Standards which are related to the program philosophy.
4 - Standards which are related to the program objectives.
... Show MoreAbstract The goal of current study was to identify the relationship between addiction of self-images (Selfie) and personality disorder of narcissus, and the difference of significance the relationship between addiction self-images (selfie) and personality disorder narcissus at students of Mustansiriya university, addiction self- images (selfie) defined: a photograph that one has taken of oneself, typically one taken with a smartphone or webcam and shared via social media, edit and down lowed to social networking sites, and over time, the replacement of normal life virtual world, which is accompanied by a lack of a sense of time, and the formation of repeated patterns increase the risk of social and personal problems. To achieve the goals
... Show MoreThe control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.
Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature show its importance in strengthening financial and operationl
... Show MoreThe current research aims to identify the stressful life events among middle school students in terms of gender (male-female), academic branch (scientific-literary), and the Life Skills of the students of the preparatory stage in terms of gender (male-female), and academic branch (scientific-literary). Additionally, the study aims to identify the relationship between stressful life events and life skills in middle school students. A sample of (200) students who were selected randomly from the Directorate of education of Baghdad Karkh/ III was used in this study. To achieve the objectives of the current research, the researcher has adopted two scales, the stressful life events scale for the researcher Al-Sultan (2008), and the life skills
... Show MoreThe research aims at identifying the level of family violence directed against the kindergarten child, as well as to identify the significance of the difference in family violence directed against the kindergarten child according to the gender variable
(male-female). It aims also to identify the significance of the difference in family violence directed against the kindergarten child according to the Stage variable (kindergarten-pre-primary). The researcher employed the descriptive correlative approach to conduct the study. The research sample was chosen in a simple random way, as the number of the participants was (130) boys and girls, with (70) males and (60) females, distributed according to the stage with (66) participants in
... Show MoreA small number of researches were done in the design and synthesis of enkephalin analogues that are able to resist degradation effect of proteolytic enzymes with good bioavailability and half-lives.Through studying structure activity relationships we tried to incorporate phthalyl group, tryptophan and lysine amino acids in different positions in the basic backbone structure of the naturally occurring opioid Leu5- and Met5- enkephalin, in the hope that such insertion of these amino acids could induce interesting addition in the biological activity of these analogues with enhancement of their bioavailability, in addition to decrease side effects as addiction liability.
These synthesized peptides are:
Vitamin E, having the well known antioxidant activity through scavenging free radicals و it occurs in several isomeric forms , these isomers have relatively different functions . One of these actions is related to its ability to inhibit platelets aggregation and hence thrombosis. The present study included a total number of apparently healthy 62 males . 11of them served as standard group , treated with 100 mg aspirin /day for more than one month . Another 31 subjects were randomly grouped into 5 groups that received different daily doses of α – tocopherol : 400 IU , 800 IU and 1200 IU for 2-6 months.The remainder ( 20 ) subjects served
... Show MoreThe breakfast key components of good nutrition and a large proportion of pupils to Ataatnol her breakfast at home and increase the failure rate breakfast increase the child's age research aims to study the importance of breakfast and emphasize the need to contain aggregates of basic food and its relationship to the curriculum daily diet and its impact on the balance of proteins, fats in food daily as well as the effect of some relevant factors such as the mother's level of education and the number of family members and summarized the most important results in that the percentage of 15.6% Neglected children eating breakfast as well as afternoon that Almaah percentages of calories coming from protein and fat at breakfast .....