Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration on each subsystem to futher reduce the hardware requirements. The DNN was designed using a system generator and implemented using very hardware description language (VHDL). The system achievments outcomes the superior’s accuracy rate of approximately 99.6 percent in distinguishing bengin from malignant tissue. Also, the hardware resources were reduced by 30 percent from works of literature with an error rate of 7e-4 when using the Kintex-7 xc7k325t-3fbg676 board.
Neural stem cells (NSCs) are progenitor cells which have the ability to self‑renewal and potential for differentiating into neurons, oligodendrocytes, and astrocytes. The in vitro isolation, culturing, identification, cryopreservation were investigated to produce neural stem cells in culture as successful sources for further studies before using it for clinical trials. In this study, mouse bone marrow was the source of neural stem cells. The results of morphological study and immunocytochemistry of isolated cells showed that NSCs can be produced successfully and maintaining their self‑renewal and successfully forming neurosphere for multiple passages. The spheres preserved their morphology in culture and cryopreserved t
... Show MoreThis paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).
Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show MoreThe aim of the present study is to provide the adequate knowledge about the role of time management in facilitate the work requirements for employees of the administrative department at the Ministry of Higher Education and Scientific Research. The research depend on studying four important dimensions which are (time planning, time organization, time direction and time observation). In addition to study other five dimensions which are (new procedures, clear procedures, short procedures, the available information and the simplicity of the methods
used).Questionnaire sheets consist of (38 questions) distributed to (170) employees and (146) sheets only were considered in the study. SPSS program was used
... Show MoreBackground Bloodstream infection (BSI) is a life-threatening condition caused by the presence of microorganisms, generally caused by a range of bacteria in the blood. Objectives The aim of this study was to evaluate the possible role of procalcitonin (PCT) and C-reactive protein (CRP) as biomarkers of pediatric BSI. Methodology The study was conducted on 150 blood samples collected from the patient who admitted to Children Welfare Teaching Hospital, Medical City, Baghdad. During the period from November 2020 to March 2021, ninety blood samples from them were positive culture and 60 blood samples were negative culture (control group). The isolates were identified depending on the morphological, microscopic examination, and biochemical tests.
... Show MoreThe detection of diseases affecting plant is very important as it relates to the issue of food security, which is a very serious threat to human life. The system of diagnosis of diseases involves a series of steps starting with the acquisition of images through the pre-processing, segmentation and then features extraction that is our subject finally the process of classification. Features extraction is a very important process in any diagnostic system where we can compare this stage to the spine in this type of system. It is known that the reason behind this great importance of this stage is that the process of extracting features greatly affects the work and accuracy of classification. Proper selection of
... Show MoreBackground: Lung cancer is responsible for the most
cancer deaths in both men and women throughout the
world. Deaths from lung cancer (160,440 in 2004,
according to the National Cancer Institute) exceed the
number of deaths from four other major cancers combined
(breast, colon, pancreatic and prostate).
Objective: To assess the behavior and the approaches of
lung cancer in a sample of Iraqi patients.
Methods: This descriptive retrospective study was
performed using the records of 390 patients proved to have
lung cancer that had attending the Thoracic Surgery
Department of Surgical Specialties Hospital-Medical City
\Baghdad for the period from January, 1st
, 2001 to
December, 31st
,2002.
Res
Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreLink failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall,
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More