Melanoma, a highly malignant form of skin cancer, affects individuals of all genders and is associated with high mortality rates, especially in advanced stages. The use of tele-dermatology has emerged as a proficient diagnostic approach for skin lesions and is particularly beneficial in rural areas with limited access to dermatologists. However, accurately, and efficiently segmenting melanoma remains a challenging task due to the significant diversity observed in the morphology, pigmentation, and dimensions of cutaneous nevi. To address this challenge, we propose a novel approach called DenseUNet-169 with a dilated convolution encoder-decoder for automatic segmentation of RGB dermascopic images. By incorporating dilated convolution, our model improves the receptive field of the kernels without increasing the number of parameters. Additionally, we used a method called Copy and Concatenation Attention Block (CCAB) for robust feature computation. To evaluate the performance of our proposed framework, we utilized the International Skin Imaging Collaboration (ISIC) 2017 dataset. The experimental results demonstrate the reliability and effectiveness of our suggested approach compared to existing methodologies. Our framework achieved a high level of accuracy (98.38%), precision (96.07%), recall (94.32%), dice score (95.07%), and Jaccard score (90.45%), outperforming current techniques.
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThe Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from
... Show MoreChronic lymphocytic leukaemia (CLL) patients display a highly variable clinical course, with progressive acquisition of drug resistance. We sought to identify aberrant epigenetic traits that are enriched following exposure to treatment that could impact patient response to therapy.
Epigenome-wide analysis of DNA methylation was performed for 20 patients at two timepoints during treatment. The prognostic significance of differentially methylated regions (DMRs) was assessed in independent cohorts of 139 and 1
Tigris River is the lifeline that supplies a great part of Iraq with water from north to south. Throughout its entire length, the river is battered by various types of pollutants such as wastewater effluents from municipal, industrial, agricultural activities, and others. Hence, the water quality assessment of the Tigris River is crucial in ensuring that appropriate and adequate measures are taken to save the river from as much pollution as possible. In this study, six water treatment plants (WTPs) situated on the two-banks of the Tigris within Baghdad City were Al Karkh; Sharq Dijla; Al Wathba; Al Karama; Al Doura, and Al Wahda from northern Baghdad to its south, that selected to determine the removal efficiency of turbidity and
... Show MoreThis paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreIn many video and image processing applications, the frames are partitioned into blocks, which are extracted and processed sequentially. In this paper, we propose a fast algorithm for calculation of features of overlapping image blocks. We assume the features are projections of the block on separable 2D basis functions (usually orthogonal polynomials) where we benefit from the symmetry with respect to spatial variables. The main idea is based on a construction of auxiliary matrices that virtually extends the original image and makes it possible to avoid a time-consuming computation in loops. These matrices can be pre-calculated, stored and used repeatedly since they are independent of the image itself. We validated experimentally th
... Show More