Preferred Language
Articles
/
bsj-9029
An Observation and Analysis the role of Convolutional Neural Network towards Lung Cancer Prediction
...Show More Authors

Lung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-cancerous cells to find the best combination of parameters in CNN to predict lung cancer accurately.  The proposed system recorded the highest accuracy of 92.79%. In addition to that, the paper addresses 192 observations made using the CNN model. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 18 2024
Journal Name
Herança
Heresy and Hypocrisy of the Church: A Marxist Analysis of Okezie Nwoka's God of Mercy
...Show More Authors

Hypocrisy is found in various aspects of life, whether in religion, politics, or social parts. Hence, some of the church's hypocrisy is an outcome of different ups and downs in life. Starting with the problem in the novel, some of the hypocritical pastors engaged in an immense role in affecting the folk's lives because they persuaded people that God ordered them to do so. To accomplish their personal interests, the abusive monks disguise their verbal speech, smiles, and fine clothes like mild sheep to delusional followers, leaving them with guilt, shame, and spiritual scars. The present study aims to examine the hypocrisy and heresy of the church as portrayed in Okezie Nwoka's novel entitled God of Mercy. It reflects the source of

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri Oct 25 2024
Journal Name
The Review Of Contemporary Scientific And Academic Studies
The Representation of Men and Women in the Black and White Streams of the Second Wave of Feminism: A Corpus Stylistic Analysis
...Show More Authors

View Publication
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Information and communication technology and its impact on the quality of service of the tourism sector and hotel: An analytical study in selected hotels in the Iraqi capital Baghdad
...Show More Authors

   The research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Robust Queues Models and its Role in Improving Performance in the City of Medicine / Baghdad Teaching Hospital / Clinic Internal Medicine Advisory
...Show More Authors

The purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values ​​or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
The Role of Labor Relations in Reducing the Cases of Job Withdrawal
...Show More Authors

he current research aims to analyze the relationship and the level of influence of labor relations in reducing the cases of job withdrawal in private colleges in Baghdad. (265) individuals from department heads, university professors, and teaching staff in (7) private colleges located in the capital, Baghdad, and based on the Stephen Thompson equation for small samples, the sample size was determined by (157) teachers, and the questionnaire was adopted as a main tool for collecting data and information After ensuring the validity and reliability of its contents, and to test the relationship of influence, correlation and interaction between the research variables, two main hypotheses were formulated from which (5) sub-hypotheses eman

... Show More
View Publication
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
The Role of Some Medicinal Plants in the Management of Peptic Ulcer
...Show More Authors

Background: Plants used in folk medicine for
the treatment of peptic ulcer diseases is a very
promising approach to overcome the limitations of
classical medicines.
Aim: To explore the efficacy of medicinal
plants, namely turmeric, garlic and marshmallow,
in eradication of H. pylori.
Methods: This prospective study was carried out
on 225 of well-known dyspeptic patients who were
divided into four groups; a control group (received
classical medical therapy) and three other groups
that received one of the three medicinal plants,
plus the same therapy used in the control group.
The follow up was done by using a questionnaire
form, endoscopic examination, and determination
of serum levels of anti

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 27 2023
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Assessing the reliability of serum macrophage migration inhibitory factor as a marker for diabetic nephropathy prediction in type 2 diabetes patients and the effect of ACE inhibitors on its level
...Show More Authors

Abstract Diabetic nephropathy (DN) is a prevalent chronic microvascular diabetic complication. As inflammation plays a vital role in the development and progress of DN the macrophages migration inhibitory factor (MIF), a proinflammatory multifunctional cytokine approved to play a critical function in inflammatory responses in various pathologic situations like DN. This study aimed To assess serum levels of MIF in a sample of Iraqi diabetic patients with nephropathy supporting its validity as a marker for predicting nephropathy in T2DM patients. In addition, to evaluate the nephroprotective effect of angiotensin-converting enzyme (ACE) inhibitors in terms of their influence on MIF levels. This is a case-control study involving ninety

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Oct 17 2011
Journal Name
Journal Of Engineering
MODIFIED TRAINING METHOD FOR FEEDFORWARD NEURAL NETWORKS AND ITS APPLICATION in 4-LINK SCARA ROBOT IDENTIFICATION
...Show More Authors

In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha

... Show More
Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
MODIFIED TRAINING METHOD FOR FEEDFORWARD NEURAL NETWORKS AND ITS APPLICATION in 4-LINK SCARA ROBOT IDENTIFICATION
...Show More Authors

In this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More