In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like identifying the sequence of events in the Laparoscopic Cholecystectomy (LC). This study will contribute to show the effectiveness of CNN-CLM approach on laparoscopic cholecystectomy, which will frequently focus on surgical computer vision analysis of surgical safety and related applications. The method of study is deep learning based CNN-CLM to better detect nominal safety as well as unsafe practices around the critical view of safety and AI-based grading scale. The general design flow of AI-recognition of surgical safety is firstly collecting safety surgical videos for frame segmenting and phase according to the image context by surgeon reviewer by CNN-CLM. For this advance research, the dataset is splatted into three main parts where 70% of which is used for training, 15% of which is used for testing and the rest for the cross validation, to achieve the accuracy up to 98.79% of this specific research. For result part, different metrics of CNN-CLM to evaluate the performance of the proposed model of safety in surgery. The study uses one of the top three performing methods CNN-CLM for the evaluation yields and anatomical structures in laparoscopic cholecystectomy surgery.
One of the important goals in the learning process is to be effective learning through the self-direction of the learner , because it has an impact on the effort of learners , it is better to be a learner responsible for learning and independent of the acquisition of knowledge ,
اذ اكدتكثيرAs many have confirmed منFrom الدراساتStudies والادبياتAnd literature انthat فشلالكثير The failure of many منFrom الطلبةStudents فيin a تنظيمgroup المعلوماتthe information ومعالجتهاAnd processed اثناءduring عمليةProcess تعلمهمLearn them لاNo يرجعReturns الىto me انخفاضdrop فيin a درجةDegree ذكائهمTheir intelligence اوor عدمNo
... Show MoreAbstract:
This Research aims to define role of the system of evaluating the performance for higher leadership in determining the level of institutional work quality in the Ministry of Agriculture, by measuring system efficiency of evaluating the performance for higher leadership and its effect in institutional work quality, the searcher reached through the theoretical framing and involved studies to build default plan define the relation between Research variables formed from system of evaluating leadership performance as independent variable contains six subsidiary dimensions: (Polarization, evaluating the performance of personnel, training, motivation, se
... Show MoreA study of characteristics of the lubricant oils and the physical properties is essential to know the quality of lubricant oils. The parameters that lead to classify oils have been studied in this research. Three types of multi-grades lubricant oils were applied under changing temperatures from 25 oC to 78oC to estimate the physical properties and mixture compositions. Kinematic viscosity, viscosity gravity constant and paraffin (P), naphthenes (N) and aromatics (A) (PNA) analysis are used to predict the composition of lubricants oil. Kinematic viscosity gives good behaviors and the oxidation stability for each lubricant oils. PNA analysis predicted fractions of paraffin (XP), naphthenes (XN),
... Show MoreIn this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreTwo compounds,[2-amino-4-(4-nitro phenyl) 1,3-thiazole],(4) and [2-amino-4-(4-bromo phenyl) 1,3-thiazole],(5), were synthesized by refluxing thiourea (1) with each of para-ntiro and para-bomophanacyl bromides(2) and (3) respectively, in absolute methanol. Then, by reaction of [5] with 3,5-dinitrobenzoyl chloride in dimethylformamide (DMF) yielded (6) .On the other hand, reaction of (4) with chloroacetyl chloride in dry benzene afforded (7), which is upon treatment with thiourea in absolute methanol, af
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreAsset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More