In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial lung CT-scans into two groups (COVID-19 and NonCOVID-19) had been proposed. A dataset used is 960 slices of CT scan collected from Iraqi patients /Ibn Al-Nafis teaching hospital. The performance metrics are used in this study (accuracy, recall, precision, and F1 scores). The results indicate that the proposed approach generated a high-quality model for the collected dataset, with an overall accuracy of 98.95% and an overall recall of 97 %.
The culture of the daily necessities of life of the individual in any society, whether advanced or simple, and the concept of multiple aspects of culture, including what is culture and education there holds that art is culture, and there are those who are classified according to human societies .. Some also go to it is not related to the study and learning .. And has been Iraq as a symbol of Arab culture, but they declined because of what passed by political crises and social in its modern history, and aims Current search to study culture psychological, political and social among the students of the university after the U.S. occupation of Iraq, the researcher prepared a questionnaire and after hold the appropriate statistical met
... Show MoreAbstract:
If we neglect the value of historical fashions as a source of inspiration for
contemporary fashion designers we will neglect a treasure of original designs.
In neglecting such a treasure how could we then know what is original. Today
the most famous fashion designers are often inspired, in the outwardly from
and internal lines of their fashions, by fashion designed during the ages of the
past.
Designers can find such fashions in books of history and museums. But
the historical ages are not equal in the fertility of the originality and novelty of
their fashions. Thus the contemporary designer may not find the old designs
inspiring so he invents them.
The researcher was keen in this paper to inclu
There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThe effect of 410nm with 100 mW output power and one centimetre spot size (0.128 W/cm2 power density) Diode laser irradiation at different exposure times on the growth of Gram-negative Pseudomonas aeruginosa and Gram-positive Staphylococcus aureus was evaluated. Seventy swap samples were collected from burn and infected wounds of 35 patients admitted to the burn-wound unit in Al-Yarmouk Teaching Hospital in Baghdad during the period from December 2014 to February 2015. These bacteria were isolated and identified depending on their growth on selective media, cultural characteristics, Gram stain morphology and biochemical tests and finally were confirmed by Vitek 2 compact system test .Susceptibility of bacterial isolates to 15antibiotics
... Show MoreBackground: Despite the importance of vaccines in preventing COVID-19, the willingness to receive COVID-19 vaccines is lower among RA patients than in the general population. Objective: To determine the extent of COVID-19 knowledge among RA patients and their attitudes and perceptions of COVID-19 vaccines. Methods: A qualitative study with a phenomenology approach was performed through face-to-face, individual-based, semi-structured interviews in the Baghdad Teaching Hospital, Baghdad, Iraq, rheumatology unit. A convenient sample of RA patients using disease-modifying anti-rheumatic drugs was included until the point of saturation. A thematic content analysis approach was used to analyze the obtained data. Results: Twenty-five RA pa
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreVaccine hesitancy poses a significant risk to global recovery from COVID-19. To date however, there is little research exploring the psychological factors associated with vaccine acceptability and hesitancy in Iraq.
To explore attitudes towards COVID-19 vaccination in Iraq. To establish the predictors of vaccine uptake and vaccine hesitancy in an Iraqi population.
Using a cross-sectional design, 7,778 participants completed an online questionnaire exploring their vaccination status, likelihood of infection, perc
Background: coronavirus 19 is a beta-coronavirus, enveloped and roughly spherical with approximately 60 to 140 nm in diameter with positive-sense single-stranded RNA genome.
Objectives: Measurement of interleukin 6 (IL6) level in a group of patients with confirmed Covid19 infection and its correlation with many hematological and biochemical parameters , mainly lymphocyte , neutrophil count and their ratio , platelet count , serum ferritin , C reactive protein as well as D-dimer level
Subjects and Methods: This study was conducted on 60 PCR positive patients variably affected by COVID-19 , cases collected sequentially from June till November 20
... Show More