Preferred Language
Articles
/
jih-1834
An Improvement of MRI Brain Images Classification Using Dragonfly Algorithm as Trainer of Artificial Neural Network
...Show More Authors

  Computer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead of backpropagation as training algorithm for artificial neural network (ANN). Some other recent training-based Neural Networks, SVM, and KNN classifiers are used for comparison with the proposed classifier. The classifiers are utilized to classify image as normal or abnormal MRI human brain image. The results show that the proposed classifier is outperformed the other competing classifiers.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Optimum Design of Power System Stabilizer based on Improved Ant Colony Optimization Algorithm
...Show More Authors

This paper presents an improved technique on Ant Colony Optimization (ACO) algorithm. The procedure is applied on Single Machine with Infinite Bus (SMIB) system with power system stabilizer (PSS) at three different loading regimes. The simulations are made by using MATLAB software. The results show that by using Improved Ant Colony Optimization (IACO) the system will give better performance with less number of iterations as it compared with a previous modification on ACO. In addition, the probability of selecting the arc depends on the best ant performance and the evaporation rate.

 

View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Hard Chromium Electroplating and Improvement the Properties by the Thermo Chemical Treatments (Solid Carburizing) of Low Carbon Steel
...Show More Authors

In this research the hard chromium electroplating process, which is one of the common methods of overlay coating was used, by using chromium acid as source of chromium and sulphuric acid as catalyst since the ratio between chromic acid and sulphuric acid is (100 : 1) consequently. Plating process was made by applying current of density (40 Amp / dm2) and the range of solution temperature was (50 – 55oC) with different time periods (1-5 hr). A  low carbon steel type (Ck15) was used as substrate for hard chromium electroplating. Solid carburization was carried out for hard chromium plating specimen at temperature (925oC) with time duration (2 hr) to be followed with quenching and tempering

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Improvement of the Fault Tolerance in IoT Based Positioning Systems by Applying for Redundancy in the Controller Layer
...Show More Authors

In recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS.  This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of innovation and modernization as an approach to strategic change in the efficiency of organizational performance Field research in the Oil Projects Company (SCOP(
...Show More Authors

 

The purpose of this research is to improve the organizational performance of the Oil Projects Company by adopting an approach to strategic change، and finding appropriate solutions to the problems facing the company. The researcher adopted in designing his research by conducting a survey of previous literature that dealt with approaches to strategic change، as the results of the survey showed that most researchers agree on the approach of renewal and modernization، Which formed a starting point for the researcher to identify the extent of the company's management interest in renewal and modernization to improve its level of performance، and the quality of the procedures followed on the ground that is related to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Analytical study of the images and roles of women and men in the books of the Arabic language at the elementary level
...Show More Authors

Importance of the research:
The importance of any educational or scientific research through its intellectual arena of facts supply the individual and society, Supports Knowledge and Science Group, which raised will be locked in these topics in the future.
This research seeks to shed light on the image and the role of women and men in the books of the Arabic language in primary education (primary), To illustrate the negative effects of the phenomenon of sexism in textbooks, And its negative impact on emerging, And stay away as much as possible about the distinction between the sexes in the roles and qualities in textbooks traditional stereotypes and remove that put both sexes templates hinder the development of the individual and t

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2011
Journal Name
Journal Of Faculty Of Medicine Baghdad
The correlation between FEV1/ FVC with Arm span to height or chest to waist ratio as an index of pulmonary function in healthy subject.
...Show More Authors

Abstract

Publication Date
Fri May 10 2019
Journal Name
Research Journal Of Chemistry And Environment
Solid Phase Extraction of Theophylline in Aqueous Solutions by Modified Magnetic Iron Oxide Nanoparticles as an Extractor Material and Spectrophotometry Technique for the Determination
...Show More Authors

new, simple and fast solid-phase extraction method for separation and preconcentration of trace theophylline in aqueous solutions was developed using magnetite nanoparticles (MIONPs) coated with aluminium oxide (AMIONPs) and modified with palmitate (P) as an extractor (P@AMIONPs). It has shown that the developed method has a fast absorbent rate of the theophylline at room temperature. The parameters that affect the absorbent of theophylline in the aqueous solutions have been investigated such as the amount of magnetite nanoparticle, pH, standing time and the volume, concentration of desorption solution. The linear range, limit of quantification (LOQ) and limit of detection (LOD) for the determination of theophylline were 0.05-2.450 μg mL-

... Show More
View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
2016 International Conference On Advances In Electrical, Electronic And Systems Engineering (icaees)
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref