<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convolutional neural network that uses other activation functions (exponential linear unit (ELU), rectified linear unit (ReLU), Swish, Leaky ReLU, Sigmoid), and the result is that utilizing CWNN gave better results for all performance metrics (accuracy, sensitivity, specificity, precision, and F1-score). The results obtained show that the prediction accuracies of CWNN were 99.97%, 99.9%, 99.97%, and 99.04% when using wavelet filters (rational function with quadratic poles (RASP1), (RASP2), and polynomials windowed (POLYWOG1), superposed logistic function (SLOG1)) as activation function, respectively. Using this algorithm can reduce the time required for the radiologist to detect whether a patient has COVID or not with very high accuracy.</p>
Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show MoreIn this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
The inhibitive power of Polyvinyl Alcohol (PVA) was investigated toward the corrosion of carbon steel in 0.2N H2SO4 solution in the temperature range of 30-60˚C and PVA concentration range of 150-2000 ppm.
The corrosion rate was measured using both the weight loss and the electrochemical techniques. The weight loss results showed that PVA could serve as a corrosion inhibitor but its inhibition power was found to be low for the corrosion of carbon steel in the acidic media. Electrochemical analysis of the corrosion process of carbon steel in an electrochemical corrosion cell was investigated using 3-Electrode corrosion cell. Polarization technique was used for carbon steel corrosion in 0.2N H
The study was conducted at the fields of the Department of Horticulture and Landscape Gardening, College of Agriculture Engineering Sciences, University of Baghdad. During the spring 2017. All the recommended practices were followed during experimentation. The experimental material consisted four Genotype it is Batraa, Btera, Mosulle, and local selection. The experiment was applied in Randomized Complete Block Design (RCBD). The objectives of Study were to estimate the some genetic parameters and path coefficient for some traits Okra, The results of statistical analysis for these genotypes were highly significant differences for all traits except the traits number of leaves, the numbe
Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was
... Show MoreThis paper reports an experimental study of welding of dissimilar materials between transparent Polymethylmethacrylate (PMMA) and stainless steel 304 sheets using a pulsed mode Nd:YAG laser. The process was carried out for two cases; laser transmission joining (LTJ) and conduction joining (CJ). The former is achieved when the joint is irradiated from the polymer side and the latter when the joint is irradiated from the opposite side (metal side). The light and process parameters represented by the peak power (Pp), pulse duration (τ), pulse repetition rate (PRR), scanning speed (ν) and pulse shape have a significant effect on the joint strength (Fb), joint bead width (b), joint quality and appearance. The optimum parameters were determined
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More