Preferred Language
Articles
/
SBbkBIcBVTCNdQwCIS0T
Classification of COVID-19 from CT chest images using Convolutional Wavelet Neural Network
...Show More Authors

<p>Analyzing X-rays and computed tomography-scan (CT scan) images using a convolutional neural network (CNN) method is a very interesting subject, especially after coronavirus disease 2019 (COVID-19) pandemic. In this paper, a study is made on 423 patients’ CT scan images from Al-Kadhimiya (Madenat Al Emammain Al Kadhmain) hospital in Baghdad, Iraq, to diagnose if they have COVID or not using CNN. The total data being tested has 15000 CT-scan images chosen in a specific way to give a correct diagnosis. The activation function used in this research is the wavelet function, which differs from CNN activation functions. The convolutional wavelet neural network (CWNN) model proposed in this paper is compared with regular convolutional neural network that uses other activation functions (exponential linear unit (ELU), rectified linear unit (ReLU), Swish, Leaky ReLU, Sigmoid), and the result is that utilizing CWNN gave better results for all performance metrics (accuracy, sensitivity, specificity, precision, and F1-score). The results obtained show that the prediction accuracies of CWNN were 99.97%, 99.9%, 99.97%, and 99.04% when using wavelet filters (rational function with quadratic poles (RASP1), (RASP2), and polynomials windowed (POLYWOG1), superposed logistic function (SLOG1)) as activation function, respectively. Using this algorithm can reduce the time required for the radiologist to detect whether a patient has COVID or not with very high accuracy.</p>

Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 30 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and Machine learning algorithm
...Show More Authors

The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
African landlocked countries problems and outlets in the study and classification of geo-political
...Show More Authors

Landlocked countries are displayed geopolitical new geo-political and intended to
countries that do not have sea views, a phenomenon present in four continents of the world
are: Africa, Europe, and Asia, and South America and the number arrived at the present time
to the (44) state the largest number of them in the continent it arrived in Africa (16) countries
in Asia (13) countries and Europe (13) In the State of South America two. This phenomenon
emerged due to the division of federations and empires and colonial treaties and others. But
the negative effects suffered by these countries may vary from one country to another, since
these countries in the continent of Europe, for example, is different from the same cou

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2025
Journal Name
Saudi Medical Journal
Spectrum and classification of ATP7B variants with clinical correlation in children with Wilson disease
...Show More Authors

View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Future Scenario of Global Climate Map change according to the Köppen -Geiger Climate Classification
...Show More Authors

Earth’s climate changes rapidly due to the increases in human demands and rapid economic growth. These changes will affect the entire biosphere, mostly in negative ways. Predicting future changes will put us in a better position to minimize their catastrophic effects and to understand how humans can cope with the new changes beforehand. In this research, previous global climate data set observations from 1961-1990 have been used to predict the future climate change scenario for 2010-2039. The data were processed with Idrisi Andes software and the final Köppen-Geiger map was created with ArcGIS software. Based on Köppen climate classification, it was found that areas of Equator, Arid Steppes, and Snow will decrease by 3.9 %, 2.96%, an

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (19)
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref