Melanoma, a highly malignant form of skin cancer, affects individuals of all genders and is associated with high mortality rates, especially in advanced stages. The use of tele-dermatology has emerged as a proficient diagnostic approach for skin lesions and is particularly beneficial in rural areas with limited access to dermatologists. However, accurately, and efficiently segmenting melanoma remains a challenging task due to the significant diversity observed in the morphology, pigmentation, and dimensions of cutaneous nevi. To address this challenge, we propose a novel approach called DenseUNet-169 with a dilated convolution encoder-decoder for automatic segmentation of RGB dermascopic images. By incorporating dilated convolution, our model improves the receptive field of the kernels without increasing the number of parameters. Additionally, we used a method called Copy and Concatenation Attention Block (CCAB) for robust feature computation. To evaluate the performance of our proposed framework, we utilized the International Skin Imaging Collaboration (ISIC) 2017 dataset. The experimental results demonstrate the reliability and effectiveness of our suggested approach compared to existing methodologies. Our framework achieved a high level of accuracy (98.38%), precision (96.07%), recall (94.32%), dice score (95.07%), and Jaccard score (90.45%), outperforming current techniques.
Software Defined Network (SDN) is a new technology that separate the control plane from the data plane. SDN provides a choice in automation and programmability faster than traditional network. It supports the Quality of Service (QoS) for video surveillance application. One of most significant issues in video surveillance is how to find the best path for routing the packets between the source (IP cameras) and destination (monitoring center). The video surveillance system requires fast transmission and reliable delivery and high QoS. To improve the QoS and to achieve the optimal path, the SDN architecture is used in this paper. In addition, different routing algorithms are used with different steps. First, we eva
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreSecurity concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreAbstract\
In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the
... Show MoreZ-scan has been utilized for studying the non-linear properties and optical limiting behaviors of the dye Copper Phthalocyanine thin films. The refractive index is negative, which indicates a self-defocusing behavior and non-linear absorption coefficient (
Background: Acute coronary syndrome (ACS) is a common disease, and a major determinant of morbidity and mortality in all races. The pleiotropic effects of the receptor activator of nuclear factor-kappa B ligand (RANKL) such as modulation of cell survival, mineralization and inflammation, make it an interesting candidate mediator in the progression and destabilization of atherosclerotic lesions.Objectives: This study was performed to investigate the role of RANKL in the pathogenesis of ACS.Methods: The levels of RANKL were measured by ELISA method in sera of 60 ACS patients, 31 patients with unstable angina (UA) and 29 patients with myocardial infarction (MI) in comparison with 20 apparently healthy controls.Results: Current data indicate
... Show MoreObjective(s): To evaluate teachers’ performance of counseling for pupils with Attention Deficit and Hyperactivity Disorder, to identify the relationship between Teachers’ Performance of Counselling for Pupils with Attention Deficit and Hyperactivity Disorder and their demographic.
Methodology: A quasi-experimental (pre-posttest) design was carried out to evaluate teachers’ performance of counseling for pupils with Attention Deficit and Hyperactivity Disorder, at Al-Firdous mixed primary School and to find out the association between teachers' performance about Attention Deficit and Hyperactivity Disorder and their socio-demographic characteristic. The study was started from 18th September 2
... Show MoreBackground: The occurrence of seizures in bacterial meningitis is important, as it has been reported to increase the risk of complications; however, its frequency and predictors are not well studied yet. Objective: To assess the frequency, clinical, and biochemical predictors of seizures in children with acute bacterial meningitis. Method: A cross-sectional study recruited confirmed acute bacterial meningitis cases based on positive CSF culture and sensitivity among children aged 2 months to 15 years admitted to the Central Child Teaching Hospital emergency department in Iraq. Patients were divided into two groups based on seizure at presentation time. Demographic characteristics [age, gender, residence, duration of fever and disease, prese
... Show MoreMammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti