Preferred Language
Articles
/
Jxg6aZQBVTCNdQwCChUu
Automatic brain tumor segmentation from MRI images using region growing algorithm
...Show More Authors

LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2

View Publication
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Land cover change detection using satellite images based on modified spectral angle mapper method
...Show More Authors

This research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio

... Show More
Scopus (3)
Scopus
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Distinguishing Shapes of Breast Cancer Masses in Ultrasound Images by Using Logistic Regression Model
...Show More Authors

The last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Classification of grapevine leaves images using VGG-16 and VGG-19 deep learning nets
...Show More Authors

The successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the domain of deep learning, further advancements and refinements in the models and datasets can be expected, potentially leading to even more accurate and efficient classification systems for grapevine leaves and beyond. Overall, this research provides valuable insights into the potential of deep learning for agricultural applications and paves the way for future studies in this domain. This work employs a convolutional neural network (CNN)-based architecture to perform grapevine leaf image classifi

... Show More
View Publication
Scopus (22)
Crossref (19)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 25 2023
Journal Name
Tikrit Journal Of Pure Science
Chemical comparison and Trichomes types of Salvia species growing in Anbar Governorate – Iraq
...Show More Authors

The trichomes and chemical composition of three species of the genus Salvia wild-grown (Salvia lanigera, Salvia spinosa) and cultured (Salvia officinalis) were studied in the Anbar governate, the chemical components of the stem and leaves were studied by Gas chromatography–mass spectrometry(GC-MS), in addition to studying the trichomes of the epidermis in the stem and leaves (upper and lower epidermis) by Light microscope. Important differences appeared to us in the chemical study, where it was found that some compounds were found in species without others, which gives them taxonomic importance, also, the trichomes were important in distinguishing the studied species, the species S. spinosa was distinguished by the presence of gla

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
A Statistical Study of the Amount of Radiation Generated from Communication Towers in the Nineveh Plain Region, Baghdeda
...Show More Authors

This research presents a statistical study of radiation generated from communication towers in the Nineveh Plain region Baghdeda. The intensity of radiation energy was measured at 10 meters away from the communication tower in different locations, using a (1PC XH-901 Dosimeter/ Personal Dose Alarm / Radiation Detector, dosage rate: 0.01 μSv/h to 150μSv/h) to measure the amount of radiation at various times. Energy densities were measured and compared with standard limits provided by other authorities, such as the International Committee for Radiation Protection. Results were analyzed using SPSS version 26 to implement the data. The results show that the means of the radiation levels measured at all the zones do not statistically differ

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 02 2012
Journal Name
Baghdad Science Journal
Studying HLA class I polymorphism in brain tumour patients
...Show More Authors

The present study aimed at shed light on the association between HLA-class I antigens (A, B and Cw) and brain tumours (meningioma and glioma) in the basis of their individual frequencies or two-locus association A total of 52 brain tumour patients were enrolled in this study, with an age range of 7-68 years. The patients were divided into two clinical groups; meningioma (20 cases) and glioma (22 cases), while the remaining 10 cases represented other types of brain tumour. Control samples included 47 Iraqi Arab apparently healthy blood volunteers, with an age range of 15-50 year. Three HLA antigens showed a significant increased frequency in total patients as compared to controls. They were B13 (34.6 vs. 6.5%), B40 (15.4 vs. 2.2%) and Cw3

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sat Nov 10 2018
Journal Name
Oriental Journal Of Chemistry
New Series of Substituted Heterocyclics Derived from α , β – Unsaturated Ketone and Their Cytotoxic Activity Tumor Cell Lines
...Show More Authors

The aldol condensation of 2-acetylnaphthalene with 9-anthracene carboxaldehyde afforded α, β-unsaturated keton (1) . New heterocyclic compounds containing: cyclohexenone[2], indazole[3], pyrimidinethion [4], thiazolo fused pyrimidine[5], isoxazoline[6], substituted pyrazoline[7]a-d and pyrimidinone[8] rings system were synthesized from α, β-unsaturated keton[1]. Cyclization of [1] with ethylacetoacetate gave the mentioned heterocycle cyclohexanone [2]. The cyclo condensation of [2] with hydrazine gave the new indazole derivative [3]. furthermore, the reation of [1]with thiourea gives thiopyrmidine derivative [4]. The cyclo condensation of [4] with chloroacetic acid gave the fused rings [5]. Then reacted compound[1] with hydroxy

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref