Preferred Language
Articles
/
R4ZTBIYBIXToZYALa3dJ
Reduced hardware requirements of deep neural network for breast cancer diagnosis
...Show More Authors

Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration on each subsystem to futher reduce the hardware requirements. The DNN was designed using a system generator and implemented using very hardware description language (VHDL). The system achievments outcomes the superior’s accuracy rate of approximately 99.6 percent in distinguishing bengin from malignant tissue. Also, the hardware resources were reduced by 30 percent from works of literature with an error rate of 7e-4 when using the Kintex-7 xc7k325t-3fbg676 board.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Civil Engineering Journal
Strength and Serviceability of Reinforced Concrete Deep Beams with Large Web Openings Created in Shear Spans
...Show More Authors

Deep beams are used in wide construction fields such as water tanks, foundations, and girders in multi-story buildings to provide certain areas free of columns. In practice it is quite often occurring to create web opening in deep beams to supply convenient passage of ventilation ducts, cable channels, gas and water pipes. Experimental studies of ten 10 deep beams were carried out, where two of them are control specimens without openings and eight with large web openings in the shear spans. The variables that have been adopted are the ratio of the shear span to the overall depth of the member cross-section, location and dimensions of the opening. Test results showed that there was a decrease in the load carrying capacity of deep bea

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Civil Engineering Journal
Strength and Serviceability of Reinforced Concrete Deep Beams with Large Web Openings Created in Shear Spans
...Show More Authors

Deep beams are used in wide construction fields such as water tanks, foundations, and girders in multi-story buildings to provide certain areas free of columns. In practice it is quite often occurring to create web opening in deep beams to supply convenient passage of ventilation ducts, cable channels, gas and water pipes. Experimental studies of ten 10 deep beams were carried out, where two of them are control specimens without openings and eight with large web openings in the shear spans. The variables that have been adopted are the ratio of the shear span to the overall depth of the member cross-section, location and dimensions of the opening. Test results showed that there was a decrease in the load carrying capacity of deep bea

... Show More
Crossref (9)
Clarivate Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Sumer 3
Treatment of shallow and deep white spot lesions with three different mouthwashes evaluated by laser fluorescence (an in vitro study)
...Show More Authors

This research aims to find how three different types of mouthwashes affect the depth of artificial white spot lesions. Teeth with various depths of white spot lesions were immersed in either splat mouthwash, Biorepair mouthwash, Sensodyne mouthwash, or artificial saliva (control)twice daily for one minute for 4 weeks and 8 weeks at 37°C. After this immersion procedure, lesion depth was measured using a diagnosed pen score. A one-way analysis of variance, Dunnett T3 and Tukey's post hoc α = .05 were used to analyze the testing data. Splat mouthwash enhanced the WSL remineralization and made the lowest ΔF compared with other mouthwashes in shallow and deep enamel after 4 and 8 weeks of treatment. In the repair groups, after 4 weeks

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 13 2023
Journal Name
Engineering, Technology & Applied Science Research
The Experimental and Theoretical Effect of Fire on the Structural Behavior of Laced Reinforced Concrete Deep Beams
...Show More Authors

A Laced Reinforced Concrete (LRC) structural element comprises continuously inclined shear reinforcement in the form of lacing that connects the longitudinal reinforcements on both faces of the structural element. This study conducted a theoretical investigation of LRC deep beams to predict their behavior after exposure to fire and high temperatures. Four simply supported reinforced concrete beams of 1500 mm, 200 mm, and 240 mm length, width, and depth, respectively, were considered. The specimens were identical in terms of compressive strength (  40 MPa) and steel reinforcement details. The same laced steel reinforcement ratio of 0.0035 was used. Three specimens were burned at variable durations and steady-state temperatures (one

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sun May 10 2020
Journal Name
Baghdad Science Journal
Characterization of Mannitol Fermenter and Salt Tolerant Staphylococci from Breast Tumor Biopsies of Iraqi Women
...Show More Authors

The emergence of staphylococci, either coagulase negative (CNS) or coagulase positive (CPS), as important human pathogens has implied that reliable methods for their identification are of large significance in understanding the diseases caused by them. The identification and characterization of staphylococci from biopsies taken from human breast tumors is reported here. Out of 32 tissue biopsies, a total of 12 suspected staphylococci grew on mannitol salt agar (MSA) medium, including 7 fermenters and 5 non-fermenter staphylococci based on traditional laboratory methods. Polymerase chain reaction (PCR) successfully identified seven isolates at the genus level as methicillin resistant Staphylococcus spp. by targeting a common region of the me

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref