Preferred Language
Articles
/
ijs-5772
A Prediction of Skin Cancer using Mean-Shift Algorithm with Deep Forest Classifier
...Show More Authors

      Skin cancer is the most serious health problems in the globe because of its high occurrence compared to other types of cancer. Melanoma and non-melanoma are the two most common kinds of skin cancer. One of the most difficult problems in medical image processing is the automatic detection of skin cancer. Skin melanoma is classified as either benign or malignant based on the results of this test. Impediment due to artifacts in dermoscopic images impacts the analytic activity and decreases the precision level. In this research work, an automatic technique including segmentation and classification is proposed. Initially, pre-processing technique called DullRazor tool is used for hair removal process and semi-supervised mean-shift algorithm is used for segmenting the affected areas of skin cancer images. Finally, these segmented images are given to a deep learning classifier called Deep forest for prediction of skin cancer. The experiments are carried out on two publicly available datasets called ISIC-2019 and HAM10000 datasets for the analysis of segmentation and classification. From the outcomes, it is clearly verified that the projected model achieved better performance than the existing deep learning techniques.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Modified Light Stemming Algorithm for Arabic Language
...Show More Authors

Stemming is a pre-processing step in Text mining applications as well as it is very important in most of the Information Retrieval systems. The goal of stemming is to reduce different grammatical forms of a word and sometimes derivationally related forms of a word to a common base (root or stem) form like reducing noun, adjective, verb, adverb etc. to its base form. The stem needs not to be identical to the morphological root of the word; it is usually sufficient that related words map to the same stem, even if this stem is not in itself a valid root. As in other languages; there is a need for an effective stemming algorithm for the indexing and retrieval of Arabic documents while the Arabic stemming algorithms are not widely available.

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Image Compression Based on Arithmetic Coding Algorithm
...Show More Authors

The past years have seen a rapid development in the area of image compression techniques, mainly due to the need of fast and efficient techniques for storage and transmission of data among individuals. Compression is the process of representing the data in a compact form rather than in its original or incompact form. In this paper, integer implementation of Arithmetic Coding (AC) and Discreet Cosine Transform (DCT) were applied to colored images. The DCT was applied using the YCbCr color model. The transformed image was then quantized with the standard quantization tables for luminance and chrominance. The quantized coefficients were scanned by zigzag scan and the output was encoded using AC. The results showed a decent compression ratio

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Algorithm Development for Full Gaps of Landsat 7 Images
...Show More Authors

      Landsat7 of Enhanced thematic mapper plus (ETM+) was launched on April 15,  1999. Four years later, images start degrading due to the scan line corrector (SLC). SLC is a malfunction that results in pixel gaps in images captured by the sensor of Landsat7. The pixel gap regions extend from about one pixel near the image center and reach up to about 14 pixels in width near the image edge. The shape of this loss is like a zigzag line; however, there are different studies about repairing these gaps. The challenge of all studies depends on retrieving inhomogeneous areas because the homogenous area can be retrieved quickly depending on the surrounding area. This research focuses on filling these gaps by utilizing pixels around them

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Chemical Engineering Research And Design
Nickel removal from simulated wastewater using a novel bio-electrochemical cell with packed bed rotating cylinder cathode
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF