Lung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-c
... Show MoreThe problem in the design of a cam is the analyzing of the mechanisms and dynamic forces that effect on the family of parametric polynomials for describing the motion curve. In present method, two ways have been taken for optimization of the cam size, first the high dynamic loading (such that impact and elastic stress waves propagation) from marine machine tool which translate by the roller follower to the cam surface and varies with time causes large contact loads and second it must include the factors of kinematics features including the acceleration, velocity, boundary condition and the unsymmetrical curvature of the cam profile for the motion curve.
In the theoretical solution
... Show MoreAbstract
Purpose: The research attempts to Stand on the reality of the effective application of of strategic information systems in telecommunications companies in the Kurdistan Region, and what is the amount of the impact of such systems on promoting of Strategic Intelligence.
Design/Methodology/Approach: The Applied method has been used, In order to achieve the objectives of the research has been the development of a questionnaire prepared for this purpose and then distributed to (11) Company of Iraqi communications operating in Kurdistan Region companies, it has been used questionnaire to collect data in order to develop
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThe work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other
... Show MoreThe paper contains a theoretical analysis of the interrelation between methodology of economics used by economic researchers and the methodology of scientific research, encouraging readers to think differently about one of the most complicated & controversial subjects.
The analysis begins with the determination of propositions that were discussed and explained in the course of the argument.
1- The economic researcher, like a scientific one, goes after the procedures of physical sciences and benefits of the forms of logic.
2- Economics deals with human behavior while the natural sciences deal with the matter.
3-This similarity a
... Show MoreAbstract
In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll
... Show MoreIn general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot. Simulation results, whi
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More