Preferred Language
Articles
/
jeasiq-2361
Distinguishing Shapes of Breast Cancer Masses in Ultrasound Images by Using Logistic Regression Model
...Show More Authors

The last few years witnessed great and increasing use in the field of medical image analysis. These tools helped the Radiologists and Doctors to consult while making a particular diagnosis. In this study, we used the relationship between statistical measurements, computer vision, and medical images, along with a logistic regression model to extract breast cancer imaging features. These features were used to tell the difference between the shape of a mass (Fibroid vs. Fatty) by looking at the regions of interest (ROI) of the mass. The final fit of the logistic regression model showed that the most important variables that clearly affect breast cancer shape images are Skewness, Kurtosis, Center of mass, and Angle, with an AUCROC of 88% and an Accuracy of almost 89%. We also came to the conclusion that the Fibroid mass is small and less white than the Fatty mass

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Sport Sciences
The effect of using the McCarthy model according to cognitive style (rigid- flexibility) in learning some skills in artistic gymnastics for women
...Show More Authors

The aim of the research is to identify the cognitive method (rigidity flexibility) of third-stage students in the collage of Physical Education and Sports Sciences at The University of Baghdad, as well as to recognize the impact of using the McCarthy model in learning some of skills in gymnastics, as well as to identify the best groups in learning skills, the experimental curriculum was used to design equal groups with pre test and post test and the research community was identified by third-stage students in academic year (2020-2021), the subject was randomly selected two divisions after which the measure of cognitive method was distributed to the sample, so the subject (32) students were distributed in four groups, and which the pre te

... Show More
Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Pharmacy Practice
A Comprehensive Review of Drivers influencing Flu Vaccine Acceptance in the Middle East: Using Health Belief Model
...Show More Authors

Rationale, aims and objectives: A review of studies published over the last six years gives update about this hot topic. In the middle of COVID-19 pandemic, this study findings can help understand how population may perceive vaccinations. The objectives of this study were to review the literature covering the perceptions about influenza vaccines and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM). Methods: A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions, and Middle East. Empirical studies that dealt with people/ HCW perceptions of influenza vaccine in the Middle East and writt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Implementation of Univariate Paradigm for Streamflow Simulation Using Hybrid Data-Driven Model: Case Study in Tropical Region
...Show More Authors

View Publication
Scopus (90)
Crossref (89)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jun 30 2018
Journal Name
Journal Inspector General
Some examples of police errors - a comparative study of the scope of civil liability between American and Iraqi laws
...Show More Authors

Police play an important role in any society. Where they maintain public order by stopping and deterring crime and bringing criminals to justice. In order to achieve these objectives, they have certain means of law (search, arrest, use of force that may be lethal in some cases). However, such means may be misused in a way that harms members of society such as (Exceeding the Scope of a search warrant, violation of privacy of individuals, False Imprisonment, Excessive use of force, Sudden Deaths in custody, Sexual Assault and Harassment, Failure to respond for Domestic violence calls), which raises the civil liability of police officers and their agencies for such damage. Police officers may even abuse their characteristics even outside offic

... Show More
View Publication
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE: GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE
...Show More Authors

This researchpaper includes the incorporation of Alliin at various energy levels and angles 

With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b

... Show More
View Publication Preview PDF
Publication Date
Thu May 16 2019
Journal Name
Al-khwarizmi Engineering Journal
Study of Transverse and Longitudinal Crack Propagation in Human Bone Using the Finite Element Method with MATLAB
...Show More Authors

A finite element is a study that is capable of predicting crack initiation and simulating crack propagation of human bone. The material model is implemented in MATLAB finite element package, which allows extension to any geometry and any load configuration. The fracture mechanics parameters for transverse and longitudinal crack propagation in human bone are analyzed. A fracture toughness as well as stress and strain contour are generated and thoroughly evaluated. Discussion is given on how this knowledge needs to be extended to allow prediction of whole bone fracture from external loading to aid the design of protective systems.

View Publication Preview PDF
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Prediction of the Scale Removal Rate in Heat Exchanger Piping System Using the Analogies between Mass and Momentum Transfer
...Show More Authors

The possibility of predicting the mass transfer controlled CaCO3 scale removal   rate has been investigated.

Experiments were carried out using chelating agents as a cleaning solution at different time and Reynolds’s number. The results of CaCO3 scale removal or (mass transfer rate) (as it is the controlling process) are compared with proposed model of prandtl’s and Taylor particularly based on the concept of analogy among momentum and mass transfer.

Correlation for the variation of Sherwood number ( or mass transfer rate ) with Reynolds’s number have been obtained .

View Publication Preview PDF