Preferred Language
Articles
/
alkej-8
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

 We have known that the wavelet transformation is more accurate in small dimension problem. But image processing is large dimension problem then we used neural network. Results are presented on the application on the three layer fuzzy wavenet to vision system. They demonstrate a considerable improvement in performance by proposed two table’s rule for fuzzy and deterministic dilation and translation in wavelet transformation techniques.

    

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Diagnosing COVID-19 Infection in Chest X-Ray Images Using Neural Network
...Show More Authors

With its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques.  T

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Customers emotional blackmail and reduce it the new product- study of the opinions of a sample of customers who deal with peak economy for household items in najaf al Ashraf
...Show More Authors

The challenges facing today's multi-customer and this is due to the multiplicity of products and speed in launching new products so search came to reveal the  reveal the of the new product classification standards through a relationship (good products, low interest products, useful products and products desired) and the customer emotionally blackmail through deportation (fear, obligation and guilt). dentified the problem of the research in several questions focused on the nature of the relationship between the variables of research, and for that outline supposedly to search it expresses the head of one hypothesis and branched out of which four hypotheses subset, but in order to ensure the validity of the ass

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
Surfactant Cloud Point Extraction as a Procedure of Preconcentrating for Metoclopramide Determination Using Spectro Analytical Technique
...Show More Authors

In current article an easy and selective method is proposed for spectrophotometric estimation of metoclopramide (MCP) in pharmaceutical preparations using cloud point extraction (CPE) procedure. The method involved reaction between MCP with 1-Naphthol in alkali conditions using Triton X-114 to form a stable dark purple dye. The Beer’s law limit in the range 0.34-9 μg mL-1 of MCP with r =0.9959 (n=3) after optimization. The relative standard deviation (RSD) and percentage recoveries were 0.89 %, and (96.99–104.11%) respectively. As well, using surfactant cloud point extraction as a method to extract MCP was reinforced the extinction coefficient(ε) to 1.7333×105L/mol.cm in surfactant-rich phase. The small volume of organi

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fabrication and Characterization of Nanofibers Membranes using Electrospinning Technology for Oil Removal
...Show More Authors

Oily wastewater is one of the most challenging streams to deal with especially if the oil exists in emulsified form. In this study, electrospinning method was used to prepare nanofiberous polyvinylidene fluoride (PVDF) membranes and study their performance in oil removal. Graphene particles were embedded in the electrospun PVDF membrane to enhance the efficiency of the membranes. The prepared membranes were characterized using a scanning electron microscopy (SEM) to verify the graphene stabilization on the surface of the membrane homogeneously; while FTIR was used to detect the functional groups on the membrane surface. The membrane wettability was assessed by measuring the contact angle. The PVDF and PVDF / Graphene membranes efficiency

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
دار الكتب والوثائق العراقيه
Introduction to Medical Physics for Pharmacy Students and Medical Groups - ISBNiraq.org
...Show More Authors

Introduction to Medical Physics for Pharmacy Students and Medical Groups - ISBNiraq.org

View Publication
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Improvement of Mechanical and Fatigue Properties for Aluminum Alloy 7049 By Using Nano Composites Technique
...Show More Authors

The aim of present work is to improve mechanical and fatigue properties for Aluminum alloy7049 by using Nano composites technique. The ZrO2 with an average grain diameter of 30-40 nm, was selected as Nano particles, to reinforce Aluminum alloy7049 with different percentage as, 2, 4, 6 and 7 %. The Stir casting method was used to fabricate the Nano composites materials due to economical route for improvement and processing of metal matrix composites. The experimental results were shown that the adding of zirconium oxide (ZrO2) as reinforced material leads to improve mechanical properties. The best percentage of improvement of mechanical properties of 7049 AA was with 4% wt. of ZrO2 about (7.76% ) for ultim

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Constructing fuzzy linear programming model with practical application
...Show More Authors

This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB )  to find the optimal solution

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Un Published
Search Engine for Identification of Personal Images
...Show More Authors