Preferred Language
Articles
/
ijl-66
Photoacoustic Imaging for Tumor Detection: An in vitro Simulation Study
...Show More Authors

Photoacoustic is a unique imaging method that combines the absorption contrast of light or radio frequency waves with ultrasound resolution. When the deposition of this energy is sufficiently short, a thermo-elastic expansion takes place whereby acoustic waves are generated. These waves can be recorded and stored to construct an image. This work presents experimental procedure of laser photoacoustic two dimensional imaging to detect tumor embedded within normal tissue. The experimental work is accomplished using phantoms that are sandwiched from fish heart or blood sac (simulating a tumor) 1-14mm mean diameter embedded within chicken breast to simulate a real tissue. Nd: YAG laser of 1.064μm and 532nm wavelengths, 10ns pulse duration, 445mJ pulse energy has been used to induce the acoustic wave signal in these targets. The acoustic signal is then filtered and analyzed to construct the target image. The analysis of experimental data and image construction has been accomplished using matlab software. The measurement analysis showed reasonable agreement between the estimated object dimension and the actual object size. The error in fish heart object dimension ranged from -14% to +9%, and the maximum error in Blood sac object dimension was -55%. The object dimensional error increased to -92% when the laser spot was magnified from 2mm to 45mm (to cover the phantom area) as the energy density decreases significantly.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
DETECTION OF Staphylococcus aureus CAUSED OF FOOD POISONING IN RED & WHITE MEAT OFFERED IN LOCAL MARKETS: DETECTION OF Staphylococcus aureus CAUSED OF FOOD POISONING IN RED & WHITE MEAT OFFERED IN LOCAL MARKETS
...Show More Authors

This study was conducted to investigate the presence of Staphylococcus aureus in the red and white meat available in local markets. They were selected ten samples of red and white meat randomly (Iraq, Saudi Arabia, Turkey, and Brazil) from different markets in Baghdad, and the results of reading the nutrition facts of media indication card showed that all models confirm to the Iraqi standard quality in terms of scanning all data of the media indication card, except for the birds of Bayader, where the date of expire & production date of the product was not mentioned. Also, the results of the study showed that there is no Staphylococcus aureus in local red and white meat as well as imported.

View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
An Experimental Study of the Server-based Unfairness Solutions for the Cross-Protocol Scenario of Adaptive Streaming over HTTP/3 and HTTP/2
...Show More Authors

Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Instructional program on patients with ulcerative colitis adherence for Medication and Diet to prevent Colorectal Cancer: case and control study
...Show More Authors

ABSTRACT:

Objectives: The study aims to know the effectiveness of the educational program in the patient’s adherence to medication and diet and to know the relationship between the effectiveness of the education program and their demographic data related to the patient’s age, gender, marital status, education level, occupation, monthly income and residence.

Methodology: A quasi -experimental design study was performed on patient who attended to Gastroenterology and Hepatology Teaching Hospital, from March 2021 to September 2021. The non-probability sampling including 50 patients for case study and 30 patients for control group. The questionnaire consists of 3 parts, part one the socio

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
An Empirical Study to Measure the Impact of Information Technology Governance Under the Control Objectives for Information and Related Technologies on Financial Performance
...Show More Authors

Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration.   Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance.   Design/methodology/approach: To investigate the effect of information technology; we the valu

... Show More
View Publication
Scopus (25)
Crossref (5)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Theoretical Calculation of the Electron Transport Parameters and Energy Distribution Function for CF3I with noble gases mixtures using Monte Carlo simulation program
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Numerical Simulation of 3D- Flow Structure and Heat Transfer for Longitudinal Riblet Upstream of Leading Edge Endwall Junction of Nozzle Guide Vane
...Show More Authors

The simulation have been made for  3D flow structure and heat  transfer with and without

longitudinal riblet upstream of leading edge vane endwall junction of first stage nozzle guide vane .The research explores concept of weakening the secondary flows and reducing their harmful effects.Numerical investigation involved examination of the secondary flows ,velocity and heat transfer rates by solving the governing equations (continuity, Navier -stokes and energy equations ) using the known package FLUENT version (12.1).The governing equations were solved for three dimentional, turbulent flowe, incompressible with an appropriate turbulent model (k-ω,SST) .The numerical solution was carried out for 25 mode

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Jordan Journal Of Physics
Theoretical Simulation of Backscattering Electron Coefficient for SixGe1-x/Si Heterostructure as a Function of Primary Electron Beam Energy and Ge Concentration
...Show More Authors

Abstract: This study aims to investigate the backscattering electron coefficient for SixGe1-x/Si heterostructure sample as a function of primary electron beam energy (0.25-20 keV) and Ge concentration in the alloy. The results obtained have several characteristics that are as follows: the first one is that the intensity of the backscattered signal above the alloy is mainly related to the average atomic number of the SixGe1-x alloy. The second feature is that the backscattering electron coefficient line scan shows a constant value above each layer at low primary electron energies below 5 keV. However, at 5 keV and above, a peak and a dip appeared on the line scan above Si-Ge alloy and Si, respectively, close to the interfacing line

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref