Preferred Language
Articles
/
bsj-6782
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature extraction step to enhance and preserve the fine details of the breast MRI scans boundaries by using fractional integral entropy FIE algorithm, to reduce the effects of the intensity variations between MRI slices, and finally to separate the right and left breast regions by exploiting the symmetry information. The obtained features are classified using a long short-term memory (LSTM) neural network classifier. Subsequently, all extracted features significantly improves the performance of the LSTM network to precisely discriminate between pathological and healthy cases. The maximum achieved accuracy for classifying the collected dataset comprising 326 T2W-TSE images and 326 STIR images is 98.77%. The experimental results demonstrate that FIE enhancement method improve the performance of CNN in classifying breast MRI scans. The proposed model appears to be efficient and might represent a useful diagnostic tool in the evaluation of MRI breast scans.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Stamps extraction using local adaptive k- means and ISODATA algorithms
...Show More Authors

<span>One of the main difficulties facing the certified documents documentary archiving system is checking the stamps system, but, that stamps may be contains complex background and surrounded by unwanted data. Therefore, the main objective of this paper is to isolate background and to remove noise that may be surrounded stamp. Our proposed method comprises of four phases, firstly, we apply k-means algorithm for clustering stamp image into a number of clusters and merged them using ISODATA algorithm. Secondly, we compute mean and standard deviation for each remaining cluster to isolate background cluster from stamp cluster. Thirdly, a region growing algorithm is applied to segment the image and then choosing the connected regi

... Show More
View Publication
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 29 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetics and Thermodynamics of Peppermint Oil Extraction from Peppermint Leaves
...Show More Authors

This study aimed to extraction of essential oil from peppermint leaves by using hydro distillation methods. In the peppermint oil extraction with hydro distillation method is studied the effect of the extraction temperature to the yield of peppermint oil. Besides it also studied the kinetics during the extraction process. Then, 2nd -order mechanism was adopted in the model of hydro distillation for estimation many parameters such as the initial extraction rate, capacity of extraction and the constant rat of extraction with various temperature. The same model was also used to estimate the activation energy. The results showed a spontaneous process, since the  Gibbs free energy had a value negative sign.

View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Sequential extraction of zinc and nickel elements in contaminated soils
...Show More Authors

Scopus (3)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Oct 26 2021
Journal Name
Remote Sensing Technologies And Applications In Urban Environments Vi
DTM Extraction and building detection in DSMs having large holes
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Fri May 20 2005
Journal Name
Thesis
Extraction and Description of Urease Enzyme Produced from Staphylococcus saprophyticus and study of its effect on kidney and bladder of white mice
...Show More Authors

Extraction and Description of Urease Enzyme Produced from Staphylococcus saprophyticus and study of its effect on kidney and bladder of white mice

Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Luminance pyramid for image generation and colorization
...Show More Authors

Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o

... Show More
Scopus (2)
Scopus