Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of Alzheimer's disease. The system employs MRI and feature extraction methods to categorize images. This paper adopts the Alzheimer's Disease Neuroimaging Initiative (ADNI) dataset includes functional MRI and Positron-Version Tomography scans for Alzheimer's patient identification, which were produced for people with Alzheimer's as well as typical individuals. The proposed technique uses MRI brain scans to discover and categorize traits utilizing the Histogram Features Extraction (HFE) technique to be combined with the Canny edge to representing the input image of the Convolutional Neural Networks (CNN) classification. This strategy keeps track of their instances of gradient orientation in an image. The experimental result provided an accuracy of 97.7% for classifying ADNI images.
Abstract
The Umayyad poets tried to invest all artistic tools in order to achieve a measure of creativity in their texts. The phenomenon of visual composition is breaking the familiar writing system, with the aim of increasing the number of possible connotations. The visual in the Umayyad poetry tries to replace it through expression with the visual image, and its manifestations were manifested by the multiplication of punctuation marks in the body of the poetic text and the tearing of the single poetic line by cutting it into several sentences or repetition.
Keywords: visual formation, poetic writing, Umayyad poetry, recipien
Background: Corona virus disease 2019 (COVID-19) is a communicable disease caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It was first identified in December 2019 in Wuhan, China, and has since spread globally, leading to an ongoing pandemic.
Aim of study: to review the clinical, lab investigation and imaging techniques, in pediatric age group affected COVID-19 to help medical experts better understand and supply timely diagnosis and treatment.
Subjects and methods: this study is a retrospective descriptive clinical study. The medical records of patients were analyzed. Information’s recorded include demographic data, exposure history, symptoms, signs, laboratory findin
... Show MoreA vascular necrosis (AVN) is defined as cellular death of bone components due to interruption of the blood supply; the bone structures then collapse, resulting in bone destruction, pain, and loss of joint function. AVN is associated with numerous conditions and usually involves the epiphysis of long bones, such as the femoral head. In clinical practice, AVN is most commonly encountered in the hip. Early diagnosis and appropriate intervention can delay the need for joint replacement. However, most patients present late in the disease course. Without treatment, the process is almost always progressive, leading to joint destruction within 5 years. Treatment of a vascular necrosis depends mainly on early diagnosis which mainly based on clinical
... Show MoreBackground: Hip fractures are common, morbid, and costly health events that threaten independence and function of older patients . Early functional recovery is extremely important for elderly patients with femoral intertrochanteric fractures to shorten their hospital stay, omit the necessity of the further nursing and care services, and reduce associated medical expenditures . Assessment of (ADL) is an important predictor of outcomes Of orthopedic surgery in very early postoperative period at two weeks and a month postoperatively using Japanese orthopedic score get a quick recovery of ADL & return the patient to his or her premorbid level function reducing the morbidity and mortality.
... Show MoreBackground: Molars and premolars are considered as the most vulnerable teeth of caries attack, which is related to the morphology of their occlusal surfaces along with the difficulty of plaque removal. different methods were used for early caries detection that provide sensitive, accurate preoperative diagnosis of caries depths to establish adequate preventive measures and avoid premature tooth treatment by restoration. The aim of the present study was to evaluate the clinical sensitivity and specificity rates of DIAGNOdent and visual inspection as opposed to the ICDAS for the detection of initial occlusal caries in noncavitated first permanent molars. Materials and Methods: This study examined 139 occlusal surface of the first permanent
... Show MoreThe Late Cretaceous-Early Paleocene Shiranish and Aliji formations have been studied in three selected wells in Jambur Oil Field (Ja-50, Ja-53, and Ja-67) in Kirkuk, Northeastern Iraq. This study included lithostratigraphy and biostratigraphy. The Late Campanian-Maastrichtian Shiranish Formation consist mainly of thin marly and chalky limestone beds overlain by thin marl beds, with some beds of marly limestone representing an outer shelf basinal environment, the unconformable contact with the above Middle Paleocene-Early Eocene Aliji Formation contain layers of limestone with marly limestone and chalky limestone which represents an outer shelf basinal environment. Five Biozones in the Shiranish Formation were determined which are: 1
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThis project sought to fabricate a flexible gas sensor based on a short functionalized multi-walled carbon nanotubes (f-MWCNTs) network for nitrogen dioxide gas detection. The network was prepared by filtration from the suspension (FFS) method and modified by coating with a layer of polypyrrole conductive polymer (PPy) prepared by the oxidative chemical polymerization to improve the properties of the network. The structural, optical, and morphological properties of the f-MWCNTs and f-MWCNTs/PPy network were studied using X-ray diffraction (XRD), Fourie-transform infrared (FTIR), with an AFM (atomic force microscopy). XRD proved that the structure of f-MWCNTs is unaffected by the synthesis procedure. The FTIR spectra verified the existence o
... Show MoreAbstract\
Dealing economic units at the present time with an industrial environment characterized by competitiveness and the pace of change and its strength as a result of this changing environment shall be on those who made it to adopt strategies that allow them to confront these variables and work in order to meet the market requirements of quality and price appropriate products to suit and the demand for those products and conditions to maintain
its competitive position and its development.
As a result, it became the subject of competitiveness in recent years and enjoys widespread attention at the global level. And in order to keep up
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha
... Show More