Preferred Language
Articles
/
ijs-6287
Unsupervised Segmentation Method for Thyroid Nodules in Ultrasound Images
...Show More Authors

Thyroid is a small butterfly shaped gland located in the front of the neck just below the Adams apple. Thyroid is one of the endocrine gland, which produces hormones that help the body to control metabolism. A different thyroid disorder includes Hyperthyroidism, Hypothyroidism, and thyroid nodules (benign/malignant). Ultrasound imaging is most commonly used to detect and classify abnormalities of the thyroid gland. Segmentation method is a tool that used widely in many applications including medical image processing. One of the common applications of segmentation is in medical image analysis for clinical diagnosis that has an important role in terms of quality and quantity.
The main objective of this research is to use the Computer-Aided Diagnosis (CAD) algorithms to help the early detection of thyroid tumors. Thyroid ultrasound images may contain speckle noise which leads to obtain incorrect result. In order to obtain good accuracy; the noise must be removed from the input image. Those propose method is started with pre-processing of the thyroid ultrasound image to enhance its contrast and removing the undesired noise in order to make the image suitable for further processing. In our proposed work, we are using bilateral filter and unsharp filter to remove speckle noise to perform the pre-processing operations on the thyroid ultrasound images. The segmentation process is performed by using Fuzzy C-Means (FCM) algorithm to detect and segment thyroid ultrasound images for the thyroid region extracted image to 6 classes for two sample normal and abnormal images. The resulted segmented ultrasound images, and then used to extract the tumor region from thyroid's image.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Al-manhaj Library
Multivariate Analysis (Second Edition)
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr

... Show More
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimate The Mean of Normal Distribution Via Preliminary Test Shrinkage Technique
...Show More Authors

 This paper is concerned with preliminary test single stage shrinkage estimators for the mean (q) of normal distribution with known variance s2 when a prior estimate (q0) of the actule value (q) is available, using specifying shrinkage weight factor y( ) as well as pre-test region (R).         Expressions for the Bias, Mean Squared Error [MSE( )] and Relative Efficiency [R.Eff.( )] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants including in these expressions. Comparisons between suggested estimators with respect to usual estimators in the sense of Relative Efficiency are given. Furthermore, comparisons with the earlier existi

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing digital documents using digital watermarking
...Show More Authors

     The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents.  But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..

In this research LSB  technique  has been used

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 15 2024
Journal Name
Al-manhaj Library
Multivariate Analysis - Second Edition
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr

... Show More
Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Discussing Fuzzy Reliability Estimators of Function of Mixed Probability Distribution By Simulation
...Show More Authors

This paper deals  with constructing mixed probability distribution  from exponential with scale parameter (β) and also Gamma distribution with (2,β), and the mixed proportions are (  .first of all, the probability density function (p.d.f) and also cumulative distribution function (c.d.f) and also the reliability function are obtained. The parameters of mixed distribution, ( ,β)  are estimated by three different methods, which are  maximum likelihood, and  Moments method,as well proposed method (Differential Least Square Method)(DLSM).The comparison is done using simulation procedure, and all the results are explained in tables.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Lark Journal
The problem of synonyms and similar words in the translation of the Holy Quran into Russian (based on the translation by Elmir Kuliev) اشكالية الترادف والكلمات المتقاربة في المعنى في ترجمة القران الكريم الى اللغة الروسية (بناءا على ترجمة إلمير كولييف) Проблема синонимов и близких по значению слов в переводе Священного Корана на русский язык (на материале перевода Эльмира Кулиева)
...Show More Authors

In our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.

Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Estimation of Causal Effect of treatment via Fuzzy Regression Discontinuity Designs
...Show More Authors

In some cases, researchers need to know the causal effect of the treatment in order to know the extent of the effect of the treatment on the sample in order to continue to give the treatment or stop the treatment because it is of no use. The local weighted least squares method was used to estimate the parameters of the fuzzy regression discontinuous model, and the local polynomial method was used to estimate the bandwidth. Data were generated with sample sizes (75,100,125,150 ) in repetition 1000. An experiment was conducted at the Innovation Institute for remedial lessons in 2021 for 72 students participating in the institute and data collection. Those who used the treatment had an increase in their score after

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Using Adaptive Neuro Fuzzy Inference System to Predict Rate of Penetration from Dynamic Elastic Properties
...Show More Authors

Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal.  The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Approximation Non-Bayesian Computation with Fuzzy Data to Estimation Inverse Weibull Parameters and Reliability Function
...Show More Authors

        In real situations all observations and measurements are not exact numbers but more or less non-exact, also called fuzzy. So, in this paper, we use approximate non-Bayesian computational methods to estimate inverse Weibull parameters and reliability function with fuzzy data. The maximum likelihood and moment estimations are obtained as non-Bayesian estimation. The maximum likelihood estimators have been derived numerically based on two iterative techniques namely “Newton-Raphson” and the “Expectation-Maximization” techniques. In addition, we provide compared numerically through Monte-Carlo simulation study to obtained estimates of the parameters and reliability function i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref