Preferred Language
Articles
/
hRemPo8BVTCNdQwCO2WT
A New Abnormality Detection Approach for T1-Weighted Magnetic Resonance Imaging Brain Slices Using Three Planes
...Show More Authors

Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, coronal plane, and sagittal plane. Three different thresholds, which are based on texture features: mean, energy and entropy, are obtained automatically. This allowed to accurately separating the MRI slice into normal and abnormal one. However, the abnormality detection contained some normal blocks assigned wrongly as abnormal and vice versa. This problem is surmounted by applying the fine-tuning mechanism. Finally, the MRI slice abnormality detection is achieved by selecting the abnormal slices along its tumour region (Region of Interest-ROI).

Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Water Treatment With Conventional and Alternative Coagulants: A Review
...Show More Authors

There is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
The Use of Lightweight Aggregate in Concrete: A Review
...Show More Authors

One of the artificial lightweight aggregates with a wide range of applications is Lightweight Expanded Clay Aggregate. Clay is utilized in the production of light aggregates. Using leftover clay from significant infrastructure development projects to manufacture lightweight aggregates has a favorable environmental impact. This research examines the expanded clay aggregate production process and the impact of processing parameters on its physical and mechanical qualities. It also looks at secondary components that can be used to improve the qualities of concrete with expanded clay aggregates. The effect of the quantity of expanded clay aggregate on the fresh, hardened, and durability qualities of concrete is also studied.

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review of the Electrical Submersible Pump Development Chronology
...Show More Authors

The electric submersible pump, also known as ESP, is a highly effective artificial lift method widely used in the oil industry due to its ability to deliver higher production rates compared to other artificial lift methods. In principle, ESP is a multistage centrifugal pump that converts kinetic energy into dynamic hydraulic pressure necessary to lift fluids at a higher rate with lower bottomhole pressure, especially in oil wells under certain bottomhole condition fluid, and reservoir characteristics. However, several factors and challenges can complicate the completion and optimum development of ESP deployed wells, which need to be addressed to optimize its performance by maximizing efficiency and minimizing costs and uncertainties. To

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (128)
Crossref (114)
Scopus Clarivate Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Iranian Journal Of Nursing And Midwifery Research
Girls’ Experiences Regarding Obesity: A Qualitative Study in Iraq
...Show More Authors
Abstract<sec> <title>Background:

Obesity among girls can cause physical, psychological, or social problems. Different cultures have different lifestyle and dietary habits which affect people’s experience about obesity. This study aimed to assess girls’ experience toward obesity.

Materials and Methods:

In 2023, a qualitative conventional content analysis method was used in this study to meet the study’s objective in Baghdad and Babylon, Iraq. A probability purposive sampling method was used to gather the sample from three high schools in t

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Taboo Words Vs. Social Deixis: A sociolinguistic Analysis of La Justice or The Cock that Crew: A Play from the Theatre of Ridiculous
...Show More Authors

Linguistic taboos exist in most cultures. Tabooed words are generally being culturespecific
and relating to bodily functions or aspects of a culture that are sacred. Such words are
avoided, considered inappropriate and loaded with affective meaning and failing to adhere to.
Strict rules, often, governing their use and lead to punishment or public shame. These taboo
words can be used as a way of violating social deixis represented by four types of honorifics;
addressee, referent, bystander, and finally setting honorifics. This paper shows how these
taboo words are used in Kenneth Bernard's play La Justice or The Cock that Crew from the
theatre of the Ridiculous as means of violating social deixis in its four types. Th

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages
Free will between Slavery and Freedom: A Study of Linda Brent in Incidents in the Life of a Slave Girl by Harriet Jacobs
...Show More Authors

Harriet Jacobs was a writer and a reformer. As a female writer in the nineteenth century, Jacobs wrote her narrative as a means of resisting the system of slavery. She wrote her book Incidents in the Life of a Slave Girl: Written by Herself, (1842) to reflect upon the exploitation of the black people and the need to change the hierarchal attitude that governs white/black relations. She was engaged in many abolitionist events and her anti-slavery approach appeared clearly in her writings. She shares Du Bios ideas about freedom and emancipation and the need for a political and cultural change. Thus, Du Bois’s theory provides a framework for her autobiographical novel where she portrays Linda Brent, the main character, a strong wille

... Show More
View Publication
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Viral Marketing Technologies on Consumer Behavior _ A survey of a sample of students from the college of administration and economics
...Show More Authors

Abstract:

Viral marketing has become one of the modern strategies adopted by organizations in the marketing of products and services. The idea of viral marketing focuses on the social relations between individuals and groups. As a result of the technological development, most organizations have resorted to using the Internet and its applications and social media to market and promote their products. To reach the largest number of consumers to display their products and services in many ways, including text, audio, visual or video and thus affect the behavior of the consumer.

The problem of the study was the following question (do viral marketing technologies have an impact on consumer behavior?)

... Show More
View Publication Preview PDF
Crossref