Preferred Language
Articles
/
hRemPo8BVTCNdQwCO2WT
A New Abnormality Detection Approach for T1-Weighted Magnetic Resonance Imaging Brain Slices Using Three Planes
...Show More Authors

Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, coronal plane, and sagittal plane. Three different thresholds, which are based on texture features: mean, energy and entropy, are obtained automatically. This allowed to accurately separating the MRI slice into normal and abnormal one. However, the abnormality detection contained some normal blocks assigned wrongly as abnormal and vice versa. This problem is surmounted by applying the fine-tuning mechanism. Finally, the MRI slice abnormality detection is achieved by selecting the abnormal slices along its tumour region (Region of Interest-ROI).

Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
A Role of Therapy that Targets Immune Checkpoint Proteins for the Treatment of Melanoma Brain Metastasis, Liver, Breast, Pancreatic Cancer and Pancreatic Adenocarcinoma
...Show More Authors

Checkpoint inhibitors are a type of immune therapy used to treat different types of cancers. These drugs block different checkpoint proteins, for example, CTLA-4, PD-1, and PD-L1 inhibitors.

They block proteins that stop the immune system from attacking the cancer cells.  Checkpoints are also described as a type of monoclonal antibody that antagonizes binding between B7 to CTLA-4 and PD-L1 to PD-1.

 Immune checkpoint inhibitors are used to treat BARCA mutated triple-negative breast cancer (TNBCS) in patients who do not respond to chemotherapy, and also in the treatment of highly mutated and solid tumors such as brain tumors, liver, and pancreatic cancers.

Immune checkpoint inhibitors exhibit an effect on solid tumo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 18 2025
Journal Name
Journal Of Genetic And Environment Conservation
Ultrasound application as a new green technology for preservation of table eggs: A review
...Show More Authors

In recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Cutaneous And Aesthetic Surgery
Topical zinc sulphate (25%) solution: a new therapy for actinic keratosis
...Show More Authors

KE Sharquie, SA Al-Mashhadani, AA Noaimi, AA Hasan, Journal of Cutaneous and Aesthetic Surgery, 2012 - Cited by 19

View Publication
Publication Date
Mon Jun 19 2017
Journal Name
Arabian Journal For Science And Engineering
A New Method to Tune a Fractional-Order PID Controller for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
About The Run Length Properties for ( Cumulative Sum(Cusum) and The Exponentially Weighted Moving Average (EWMA)) control charts for Poisson Distribution
...Show More Authors

     In this study, we investigate about the run length properties of cumulative sum (Cusum) and The exponentially weighted moving average (EWMA) control charts, to detect positive shifts in the mean of the process for the poisson distribution with unknown mean. We used markov chain approach to compute the average and the standard deviation for run length for Cusum and EWMA control charts, when the variable under control follows poisson distribution. Also, we used the Cusum and the EWMA control charts for monitoring a process mean when the observations (products are selected from Al_Mamun Factory ) are identically and independently distributed (iid) from poisson distribution i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Proceedings Of First International Conference On Mathematical Modeling And Computational Science: Icmmcs 2020
Study the Stability for Ordinary Differential Equations Using New Techniques via Numerical Methods
...Show More Authors

Nonlinear differential equation stability is a very important feature of applied mathematics, as it has a wide variety of applications in both practical and physical life problems. The major object of the manuscript is to discuss and apply several techniques using modify the Krasovskii's method and the modify variable gradient method which are used to check the stability for some kinds of linear or nonlinear differential equations. Lyapunov function is constructed using the variable gradient method and Krasovskii’s method to estimate the stability of nonlinear systems. If the function of Lyapunov is positive, it implies that the nonlinear system is asymptotically stable. For the nonlinear systems, stability is still difficult even though

... Show More
Scopus (8)
Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto

... Show More
View Publication Preview PDF
Scopus (7)
Scopus