Problem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a CT lung cancer dataset consisting of 1000 images and four different classes. The data augmentation process is applied to prevent overfitting, increase the size of the data, and enhance the training process. Score-level fusion and ensemble learning are also used to get the best performance and solve the low accuracy problem. All models were evaluated using accuracy, precision, recall, and the F1-score. Results: Experiments show the high performance of the ensemble model with 99.44% accuracy, which is better than all of the current state-of-the art methodologies. Conclusion: The current study's findings demonstrate the high accuracy and robustness of the proposed ensemble transfer deep learning using various transfer learning models
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei
... Show MoreDiabetic kidney disease is an illness of the glomerulus that interferes with the glomerular filtration barrier (GFB), which is worked to enable kidney to selective purification of water and solutes in addition to limiting the movement of large macromolecules such as albumin. In the glomerular endothelium, mesangial cells, foot cells, and the brush border of the proximal tubules, ACE-2 is expressed and that the kidneys represent the highest-expressing region of this enzyme. Thus, the current study aimed to evaluate ACE-2 level in this case compared to healthy condition. The study Conducted with 120 male and female ranging in age (30-65) years old. Ninety patients with type 2 diabetes subdivided into three groups on the basis of A
... Show MoreThe purpose of this paper is to develop a hybrid conceptual model for building information modelling (BIM) adoption in facilities management (FM) through the integration of the technology task fit (TTF) and the unified theory of acceptance and use of technology (UTAUT) theories. The study also aims to identify the influence factors of BIM adoption and usage in FM and identify gaps in the existing literature and to provide a holistic picture of recent research in technology acceptance and adoption in the construction industry and FM sector.
Do’a and Zikr al-Mā’thur (authentic supplications and remembrance of ALLAH ‘Azza wa Jalla) can be suggested to Muslims to help them deal with challenges or issues in life. Counselling cases affect a person’s feelings. Do’a and Zikr al-Mā’thur are often applied as a counselling intervention. Unfortunately, the authentic Do’a and Zikr al-Mā’thur are dispersed in many resources not visible to users, and the fact that not all online resources offer access to accurate Do’a and Zikr al-Mā’thur to users and the dubious Do’a and Zikr al-Mā’thur frequently credited to the Prophet (pbuh). The goal of this research is to develop an ontology
... Show MoreObjectives: To determine the effectiveness of the instructional program on patients’ knowledge about home safety while receiving anti-cancer treatment at Al- Karama Teaching Hospital in Al-Kut City.
Methodology: A quasi-experimental design is conducted through the application of a pre-test and post-test approach for the study and control groups from February 5th, 2020 to April 25th, 2020. A non–probability (purposive) sample of (50) patients treated at the Blood Disease and Oncology Center is selected and divided into two groups. Each group contains (25) patients as control and study groups. An instrument is constructed that is comprised of two parts; t
... Show MoreFind extract This research aims to find out (after learning strategy cells in the development of critical thinking and reflective thinking at the fifth-grade students in the geographic literary material). And follow researcher Almhnj demo for the purpose of achieving the goals of current research and design on an experimental group and a control with a test group after me and adopted chose researcher sample Find a way Mqsidih students of junior high Kadhimiya Boys of the breeding Baghdad / Karkh II and to verify the effectiveness of the search coined researcher hypotheses following cases: - 1. No statistically significant between the mean scores of the experimental group and the students taught her students that strategy differences (lea
... Show MoreAbstract The aim of this study is preparing an intellectual map according to the feedback (verbally and writhingly ) in order to learn some skills of floor exercises in the women's artistic gymnastics , In addition to that the aim of this study defines on the impacts of intellectual map according to the feedback approach, and to identify the best group between the three groups study in the learning of skills approach in this study, the researchers used the experimental method, the subject of the study included on students second class in physical education and sport sciences , Baghdad University (2014-2015) , and divided into three groups for teaching skills which was under studied .The species used the specific manner by lot for selection
... Show More