Preferred Language
Articles
/
Shc5qpMBVTCNdQwCn-kn
ALL-FABNET: Acute Lymphocytic Leukemia Segmentation Using a Flipping Attention Block Decoder-Encoder Network
...Show More Authors

Melanoma, a highly malignant form of skin cancer, affects individuals of all genders and is associated with high mortality rates, especially in advanced stages. The use of tele-dermatology has emerged as a proficient diagnostic approach for skin lesions and is particularly beneficial in rural areas with limited access to dermatologists. However, accurately, and efficiently segmenting melanoma remains a challenging task due to the significant diversity observed in the morphology, pigmentation, and dimensions of cutaneous nevi. To address this challenge, we propose a novel approach called DenseUNet-169 with a dilated convolution encoder-decoder for automatic segmentation of RGB dermascopic images. By incorporating dilated convolution, our model improves the receptive field of the kernels without increasing the number of parameters. Additionally, we used a method called Copy and Concatenation Attention Block (CCAB) for robust feature computation. To evaluate the performance of our proposed framework, we utilized the International Skin Imaging Collaboration (ISIC) 2017 dataset. The experimental results demonstrate the reliability and effectiveness of our suggested approach compared to existing methodologies. Our framework achieved a high level of accuracy (98.38%), precision (96.07%), recall (94.32%), dice score (95.07%), and Jaccard score (90.45%), outperforming current techniques.

Scopus Crossref
View Publication
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Laminin Is a Promising Predictive Biomarker for Acute and Chronic Toxoplasmosis
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Toxicology
Acute β - N -Methylamino-L-alanine Toxicity in a Mouse Model
...Show More Authors

The cyanobacterial neurotoxinβ-N-methylamino-L-alanine (BMAA) is considered to be an “excitotoxin,” and its suggested mechanism of action is killing neurons. Long-term exposure to L-BMAA is believed to lead to neurodegenerative diseases including Parkinson’s and Alzheimer’s diseases and amyotrophic lateral sclerosis (Lou Gehrig’s disease). Objectives of this study were to determine the presumptive median lethal dose (LD50), the Lowest-Observed-Adverse-Effect Level (LOAEL), and histopathologic lesions caused by the naturally occurring BMAA isomer, L-BMAA, in mice. Seventy NIH Swiss Outbred mice (35 male and 35 female) were used. Treatment group mice

... Show More
View Publication
Scopus (20)
Scopus
Publication Date
Thu Aug 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Application of Kass' Snake in Medical Images Segmentation
...Show More Authors

A   snake   is   an   energy-minimizing   spline   guided   by   external

constraint forces and influenced by image forces that pull it toward features such as lines and edges. Snakes are active contour models: they lock onto nearby edges, localizing them accurately. Snakes provide a unified account of a number of visual problems, including detection of edges, lines, and motion tracking. We have used snakes successfully for segmentation, in  which  user-imposed  constraint forces guide the snake near features of interest (anatomical structures). Magnetic Resonance Image (MRI) data set and Ultrasound images are used for our experiments.

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Artificial Intelligence
Recursive Multi-Signal Temporal Fusions With Attention Mechanism Improves EMG Feature Extraction
...Show More Authors

View Publication
Scopus (30)
Crossref (27)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Screening for Attention Deficit Hyperactivity Disorder at Elementary Schools in Baghdad City
...Show More Authors

Objective(s): To determine the prevalence of ADHD among elementary school pupils; identify the association between pupil's level of ADHD and age, etc., and investigate the differences in pupils ADHD based on gender, and grade.

Methodology: A descriptive study was conducted on elementary school pupils. The study started from the period of 16th of September 2019 to the 1st of October 2020. A cluster sample of 800 pupils was selected. The questionnaire was constructed and developed and include two parts: the first part includes the pupil's general information and the second part includes scale of ADHD prevalence.

Results: The results of the present study indicated that 38(4.

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref