After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings, and Pneumonia) classification tasks. Our model has achieved an accuracy value of 98.4% for binary and 93.8% for the multi-class classification. The number of parameters of our model is 11 Million parameters which are fewer than some state-of-the-art methods with achieving higher results.
The research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
AR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreThe research aims at identifyiny the effect of (Danials Model) in concepts Acquisition of Education Principles on Students at college at Education The total unmber of Students , is (65) male and female Students distributed in two groups . The First group is the experiemental group which is taught the (Danials Model) and is (34) Students . The second groupe is the control group which is taught the traditional method of teaching and it is (31) Students . The researcher has matcheol between the two groupe by the following variables : the age , (in monthes) their intelligence their parents a cademic leve of education . The research has constructed a test of (20) items of multiple choice test . The reliability of The test has been cal
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThe internal observing system is considered a cornerstone for the high management in all the systems. It aims at defending the things for waste and increasing efficient and application the rules and regulations and constrictions. To easier for the high management activity in the internal observing system which in presented and practiced and to what extent can depend on it. Thus it goes to evaluate the internal observing system periodically to check the weak points in that system so as the find out the mistake, in the construction of the system or mistake, by indication of the workers. The importance of this study is represented in the need of increasing the coactivity in the internal observing system so as to be in touch with the new tre
... Show MoreMixture experiments are response variables based on the proportions of component for this mixture. In our research we will compare the scheffʼe model with the kronecker model for the mixture experiments, especially when the experimental area is restricted.
Because of the experience of the mixture of high correlation problem and the problem of multicollinearity between the explanatory variables, which has an effect on the calculation of the Fisher information matrix of the regression model.
to estimate the parameters of the mixture model, we used the (generalized inverse ) And the Stepwise Regression procedure
... Show MoreA paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho
... Show More