In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like identifying the sequence of events in the Laparoscopic Cholecystectomy (LC). This study will contribute to show the effectiveness of CNN-CLM approach on laparoscopic cholecystectomy, which will frequently focus on surgical computer vision analysis of surgical safety and related applications. The method of study is deep learning based CNN-CLM to better detect nominal safety as well as unsafe practices around the critical view of safety and AI-based grading scale. The general design flow of AI-recognition of surgical safety is firstly collecting safety surgical videos for frame segmenting and phase according to the image context by surgeon reviewer by CNN-CLM. For this advance research, the dataset is splatted into three main parts where 70% of which is used for training, 15% of which is used for testing and the rest for the cross validation, to achieve the accuracy up to 98.79% of this specific research. For result part, different metrics of CNN-CLM to evaluate the performance of the proposed model of safety in surgery. The study uses one of the top three performing methods CNN-CLM for the evaluation yields and anatomical structures in laparoscopic cholecystectomy surgery.
Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreIn this paper we describe several different training algorithms for feed forward neural networks(FFNN). In all of these algorithms we use the gradient of the performance function, energy function, to determine how to adjust the weights such that the performance function is minimized, where the back propagation algorithm has been used to increase the speed of training. The above algorithms have a variety of different computation and thus different type of form of search direction and storage requirements, however non of the above algorithms has a global properties which suited to all problems.
The term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n
... Show MoreThe tagged research is concerned with observation and investigating the concepts of consistency and harmony in contemporary Iraqi painting (selected models) in order to reveal the mechanisms and rules of these two concepts in the artistic field and their mechanisms of operation. How reflected tools Consistency and harmony in contemporary Iraqi painting? What is consistency and what are its mechanisms and principles? Is consistency a unit product quality? Are there similarities between consistency and harmony? What is harmony and its principles and rules? As for the second chapter, it included two topics that dealt with the first topic - consistency and harmony between concept and significance, while the second topic meant - histor
... Show MoreThe aim of the research is to identify the level of both organizational trust and decentralized performance of those in charge of managing local championships for the Iraqi Athletics Federation, and to identify the effect of organizational trust in decentralized performance from their point of view. The descriptive approach was based on the method of relational relations on a sample of those in charge of managing local championships for the Iraqi Federation In athletics, represented by each of (coaches, referees, members, president and members of the administrative body of the central federation, and the president of members of sub-federations) for the sports season (2020/2021) of 260 individuals, all of them were intentionally chosen by (1
... Show MoreThe isolates of Staphylococcus aureus were isolated from patients with various infections in hospitals, the isolates were identified and accurately diagnosed by phenotypic examination and biochemical tests, as well Vitek-2, and then genetic detection and diagnosis of many of the pathogenic factors associated with Staphylococcus aureus using conventional polymerase chain reaction (PCR) and testing for association by antibiotic resistance and production of some toxins by Staphylococcus aureus. After performing analysis of statistical, it was set up that the correlation coefficient of the PCR technique using virulence genes, sensitivity test to antibiotics and other virulence factors were significant at p < 0.05, but was insignificant with the
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreBackground: Semen contamination is a detrimental factor in decreasing fertility. Seasonal changes may affect the contamination, too. Objectives: This study was designed to detect semen contamination in ovine and caprine during different seasons. Methods: Six fully mature male sheep and goats were subjected to electro-ejaculator collection twice monthly from February 1, 2022, to January 31, 2023 (Spring, February 1, 2022-April 30, 2022; Summer, May 1, 2022, July 31, 2022; Autumn August 1, 2022, October 31, 2022; Winter November 1, 2022, January 31, 2023), for studying the seasonal effect. A total of 288 semen samples were collected from both species (36 samples from each per season). All samples were subjected to bacterial isolatio
... Show MoreThe fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show More