Preferred Language
Articles
/
bsj-9740
Early Diagnose Alzheimer's Disease by Convolution Neural Network-based Histogram Features Extracting and Canny Edge

Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of Alzheimer's disease. The system employs MRI and feature extraction methods to categorize images. This paper adopts the Alzheimer's Disease Neuroimaging Initiative (ADNI) dataset includes functional MRI and Positron-Version Tomography scans for Alzheimer's patient identification, which were produced for people with Alzheimer's as well as typical individuals. The proposed technique uses MRI brain scans to discover and categorize traits utilizing the Histogram Features Extraction (HFE) technique to be combined with the Canny edge to representing the input image of the Convolutional Neural Networks (CNN) classification. This strategy keeps track of their instances of gradient orientation in an image. The experimental result provided an accuracy of 97.7% for classifying ADNI images.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Parallel Routing in Wireless Sensor Network

The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network

View Publication
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Tue Oct 06 2020
Journal Name
College Of Islamic Sciences
Distinctive Voice Features of Al Qalqala Sounds and their Expressive Values in the Holy Qur’an

  Summary This research, entitled  (Distinguishing Voice Features of Qalqales Voices and their Expressive Values ​​in the Holy Quran), aims to shed light on five of the voices that are characterized by strength and intensity, whose pronunciation requires loud vocal tone, great effort and semantic dimensions.The research consists of two topics .in the first topic. We talked about the voices of Alqalqal , their definition, their degrees, their ranks, and the opinions of scholars about them.

In the second topic, titled Expressive Values ​​for Weak Voices in the Holy Qur’an, we talked about the relationship between sound and meaning, and we clarified in it the expressive values ​​of Qalqa

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 09 2019
Journal Name
Преподаватель ХХi век | مجلة الاستاذ في القرن الواحد و العشرين
Arabic borrowings in the Russian language and features of their actualization in the modern period

Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
مجلة كلية الاداب | جامعة بغداد
STRUCTURAL AND TYPOLOGICAL FEATURES OF UNITS OF THE RUSSIAN TERMINOLOGICAL SYSTEM OF THE OIL AND GAS INDUSTRY

Preview PDF
Publication Date
Mon Dec 11 2006
Journal Name
Iraqi Journal Of Laser
The Inhibition of Streptococcus mutans by He- Ne Laser via TBO Photosensitizer

This work aims to investigate the inhibition of vitality of Streptococcus mutans, which is the causative agent of caries. A 632.8 nm He-Ne laser with the output power of 4.5mW was used in combination with toluidine blue O (TBO) at the concentration of 50μg/ml as a photosensitizer. Streptococcus mutans was isolated from 35 patients if carious teeth. Three isolates were chosen and exposed to different energy densities of He – Ne laser light 3.8, 11.7, 34.5 and 104.1 J/cm². After irradiation, substantial reduction was observed in the number of colony forming units (CFU)/ ml. The reduction in the number of CFU was increasing as the dose increased.

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Dec 19 2024
Journal Name
Ieee Explorer
A Novel Flow Priority and Continuity Control Mechanism in SDN Network

In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p

... Show More
View Publication
Crossref