Preferred Language
Articles
/
hBZ844sBVTCNdQwCguO8
Automated Stand-alone Surgical Safety Evaluation for Laparoscopic Cholecystectomy (LC) using Convolutional Neural Network and Constrained Local Models (CNN-CLM)
...Show More Authors

In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like identifying the sequence of events in the Laparoscopic Cholecystectomy (LC). This study will contribute to show the effectiveness of CNN-CLM approach on laparoscopic cholecystectomy, which will frequently focus on surgical computer vision analysis of surgical safety and related applications. The method of study is deep learning based CNN-CLM to better detect nominal safety as well as unsafe practices around the critical view of safety and AI-based grading scale. The general design flow of AI-recognition of surgical safety is firstly collecting safety surgical videos for frame segmenting and phase according to the image context by surgeon reviewer by CNN-CLM. For this advance research, the dataset is splatted into three main parts where 70% of which is used for training, 15% of which is used for testing and the rest for the cross validation, to achieve the accuracy up to 98.79% of this specific research.  For result part, different metrics of CNN-CLM to evaluate the performance of the proposed model of safety in surgery. The study uses one of the top three performing methods CNN-CLM for the evaluation yields and anatomical structures in laparoscopic cholecystectomy surgery.

Scopus Crossref
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Communications In Computer And Information Science
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
The Safety of Oral Ketoconazole in the Treatment of Skin Diseases (Single Blinded, Therapeutic, Comparative Study)
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 20 2018
Journal Name
Al-adab Journal
An Evaluation of the "English for Iraq" Course for the Fifth Grade Secondary Schools
...Show More Authors

Providing Iraqi students with proficiency in English is the ultimate goal of the educational system which is a way of getting knowledge in the fields of arts, sciences, transferring knowledge and sciences to other communities. Therefore, conducting such a type of study is very important because the contents of English textbooks have a huge influence on learning of the students. Once the content of English textbooks contain errors as the correct one, this will effect on his/her learning. The present study is an attempt to evaluate the new course entitled “English for Iraq” for fifth grade students for secondary schools, by Olivia Johnston and Mark Farell. It aims to answer eleven questions relating to the following domains: strength, obj

... Show More
View Publication
Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of National Standards for Exposure to Chemical Materials and Dusts in the State Company for Drugs Industry in Samarra
...Show More Authors

Objective: Evaluation the national standards for exposure to chemical materials and dusts in The State
Company for Drugs Industry in Samarra.
Methodology: A descriptive evaluation design is employed through the present study from 25th May 2011
to 30th November 2011 in order to evaluate the national standards for exposure chemical materials and dusts
in The State Company for Drugs Industry in Samarra. A purposive (non-probability) sample is selected for the
study which includes (110) workers from the State Company for Drugs Industry in Samarra. Data were
gathered through the workers` interviewed according to the nature of work that they perform. The evaluation
questionnaire comprised of three parts which include the w

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Display, analyze and evaluate the alternatives selected models used in the measurement and disclosure of corporate social responsibility
...Show More Authors

       The economic development and intense competition may make economic units neglected the social aspect as a service workers and the environment, the community and focus on the economic side and achieve profitability only, which puts it in a position of accountability of trade unions and bodies, environment, health, civil society organizations and the focus of many studies accounting in order to clarify social activities and disclosed in the financial statements, increasing pressure from multiple parties calling for governments to issue laws and regulations oblige economic units to disclose complete and accurate information in a timely manner for all social activities and be subj

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 13 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
The Effect of Systemic Proteolytic Enzymes on Postoperative Inflammatory Response and Quality of Life after Surgical Extraction of Impacted Mandibular Third Molar
...Show More Authors

Background: The surgical extraction of impacted third molar usually results in postoperative inflammation manifested as pain, facial swelling and trismus which may cause deterioration in the patient’s quality of life. Methods: This randomized controlled study included 56 patients indicated for surgical extraction of IMTM under local anesthesia. These patients were randomly assigned into two groups: a study group that included patients who received Tibrolin® postoperatively and a control group that did not. The predictor variable was whether to use SET or not. Pain measured by the pain numerical rating scale (NRS), facial swelling, and the degree of trismus were the outcome variables. The Arabic version of the Oral Health Impact P

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref