Preferred Language
Articles
/
ijs-12176
Automatic Segmentation and Identification of Abnormal Breast Region in Mammogram Images Based on Statistical Features
...Show More Authors

Breast cancer is one of the most common malignant diseases among women;
Mammography is at present one of the available method for early detection of
abnormalities which is related to breast cancer. There are different lesions that are
breast cancer characteristic such as masses and calcifications which can be detected
trough this technique. This paper proposes a computer aided diagnostic system for
the extraction of features like masses and calcifications lesions in mammograms for
early detection of breast cancer. The proposed technique is based on a two-step
procedure: (a) unsupervised segmentation method includes two stages performed
using the minimum distance (MD) criterion, (b) feature extraction based on Gray
level Co-occurrence matrices GLCM for the identification of masses and
calcifications lesions. The method suggested for the detection of abnormal lesions
from mammogram image segmentation and analysis was tested over several images
taken from National Center for Early Detection of cancer in Baghdad.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Statistical analysis of the removal of Chromium(VI)by Iron Oxide Nanoparticle (Fe3O4)
...Show More Authors

Investigation of the adsorption of Chromium (VI) on Fe3O4 is carried out using batch scale experiments according to statistical design using a software program minitab17 (Box-Behnken design). Experiments were carried out as per Box-Behnken design with four input parameters such as pH (2-8), initial concentration (50–150mg/L), adsorbent dosage (0.05–0.3 g) and time of adsorption (10–60min). The better conditions were showed at pH: 2; contact time: 60 min; chromium concentration: 50 mg/L and magnetite dosage: 0.3 g for maximum Chromium (VI) removal of (98.95%) with an error of 1.08%. The three models (Freundlich, Langmuir, and Temkin) were fitted to experimental data, Langmuir isotherm has bette

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Low Energy Consumption Scheme Based on PEGASIS Protocol in WSNs
...Show More Authors

Wireless Sensor Networks (WSNs) are composed of a collection of rechargeable sensor nodes. Typically, sensor nodes collect and deliver the necessary data in response to a user’s specific request in many application areas such as health, military and domestic purposes. Applying routing protocols for sensor nodes can prolong the lifetime of the network. Power Efficient GAthering in Sensor Information System (PEGASIS) protocol is developed as a chain based protocol that uses a greedy algorithm in selecting one of the nodes as a head node to transmit the data to the base station. The proposed scheme Multi-cluster Power Efficient GAthering in Sensor Information System (MPEGASIS) is developed based on PEGASIS routing protocol in WSN. The aim

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Partial Cryptography in Digital Media Environment Based on ECC Algebra
...Show More Authors

In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Population based Study on Self Medication Practice in Pakistan
...Show More Authors

Background: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.

Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.

Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Isolation and Identification of Fungi from Clinical Samples of Diabetic Patients and Studying the Anti-Fungal Activity of Some Natural Oils on Isolated Fungi
...Show More Authors

Isolation of fungi was performed from February to July, 2019. One hundred clinical specimens were collected from King Abdullah Hospital (KAH) Bisha, Saudi Arabia. Samples were collected from twenty patients of different ages (30 - 70 years old) ten males and ten females. The samples were collected from patients with the two types of diabetics. Specimens included blood, hair, nail, oral swabs and skin.  Specimens were inoculated on Sabourauds Dextrose agar containing chloramphenicol. Thirteen fungal species were isolated and identified. The isolated species were: Aspergillus flavus, A. niger, A. terrus, A. nidulans, A. fumigatus, Candida albicans, C. krusei, C. parapsilosis, C. Tropicalis, Curvularia lunata, Fusarium solani, Penicill

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
“Using the Statistical Analysis for deduction the childhood status in Iraq during 2006-2010”
...Show More Authors

   To deduct the childhood status in Iraq, it was important manner to use statistical tools and approaches concerned with interpreting the causal relationships and their attitudes and use classification method for the important effects (variables) to draw an obvious picture of the phenomena under study in order to make it useful through investing, updating and improving it in by demographic studies in the future. Two statistical methods had been used in the field of analyzing data of multivariate analysis namely, Cluster Analysis and Factor Analysis.  

The present study focuses on four fundamental axes .The nutrition axis, health axis, Educational axis, and the social axis. The study has ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Evaluation the turbidity removal efficiency in Al-Wahda water treatment plant using statistical indicators
...Show More Authors
Abstract<p>Most of drinking water consuming all over the world has been treated at the water treatment plant (WTP) where raw water is abstracted from reservoirs and rivers. The turbidity removal efficiency is very important to supply safe drinking water. This study is focusing on the use of multiple linear regression (MLR) and artificial neural network (ANN) models to predict the turbidity removal efficiency of Al-Wahda WTP in Baghdad city. The measured physico-chemical parameters were used to determine their effect on turbidity removal efficiency in various processes. The suitable formulation of the ANN model is examined throughout many preparations, trials, and steps of evaluation. The predict</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
...Show More Authors

   This paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Enhanced Cartooning System Based on Dynamic Augmented KMCG and LIP
...Show More Authors

The Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.

View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref