Preferred Language
Articles
/
jih-1834
An Improvement of MRI Brain Images Classification Using Dragonfly Algorithm as Trainer of Artificial Neural Network
...Show More Authors

  Computer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead of backpropagation as training algorithm for artificial neural network (ANN). Some other recent training-based Neural Networks, SVM, and KNN classifiers are used for comparison with the proposed classifier. The classifiers are utilized to classify image as normal or abnormal MRI human brain image. The results show that the proposed classifier is outperformed the other competing classifiers.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Al-academy
The semiology of culture and the sign variable in a theatre performance: Iraqi theatre as an example
...Show More Authors

The culture of theatre performance has a vital role in the process of reading the linguistic and visual signs of the performance. And the process of transforming a theatre performance from its original context into a new hosting cultural context starts from the actual reading of the text. Directors derives their new signs out of his personal culture, depending on the society where they lives and the culture that forms the social conventions, traditions and beliefs. The text is usually written within its own historical and temporal culture. The process of its production usually takes it away from its original culture, when it interprets the codes of the original writer and their visual and linguistic signs and instils new alternative sign

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 24 2025
Journal Name
Journal Of Babylon Center For Humanities Studies
The manifestations of existentialism in the novel "Life as an example" by writer Pinchas Sadia
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Deposited Cu (In, Ga) Se2 (CIGS) by spin-coating technique as an absorber layer of solar-cells
...Show More Authors

Cu (In, Ga) Se2 (CIGS) nano ink were synthesized from molecular precursors of CuCl, In Cl3, GaCl3 and Se metal heated to 240 °C for 1 hour in N2-atmosphere to form CIGS nanocrystal ink, Thin films were deposited onto Au/soda-lime glass (SLG) substrates. This work focused on CIGS nanocrystals, including their synthesis and application as the active light absorber layer in photovoltaic devices (PVs). This approach, using spin-coating deposition of the CIGS light absorber layers (75 mg/ml and 150 nm thickness), without high temperature selenization, has enabled up to 1.398 % power conversion efficiency under AM 1.5 solar illumination. X-ray diffraction (XRD) studies show that the structural formation of CIGS chalcopyrite structure. The mo

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Alice walker as an Activist and celebrator of Resistance in Meridian (1976) and The Color Purple (1982).
...Show More Authors

    Alice Walker (1944) ranks among the greatest American writers of the twentieth century. Through her novels Meridian and the color Purple, Alice outlines many issues concerning the effect of authoritarian thinking upon its often innocent victims, and the possibility of meaningful, productive resistance. Walker's texts aim at giving a voice to those who have no voice especially those poor, rural black women who are robbed of power and the right to make decisions about their own lives by a range of forces standing against them. These texts also aim at clarifying how Walker's female protagonists, Meridian and Celia try to free themselves from oppression, misery , fear and underestimation

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 24 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Validity of Hounsfield Units from computed tomographic images of mandibular bone in detection of osteoporosis
...Show More Authors

Background: The figure for the clinical application of computed tomography have been increased significantly in oral and maxillofacial field that supply the dentists with sufficient data enables them to play a main role in screening osteoporosis, therefore Hounsfield units of mandibular computed tomography view used as a main indicator to predict general skeleton osteoporosis and fracture risk factor. Material and Methods: Thirty subjects (7 males &23 females) with a mean age of (60.1) years underwent computed tomographic scanning for different diagnostic assessment in head and neck region. The mandibular bone quality of them were determined through Hounsfield units of CT scan images and were correlated with the bone mineral density v

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Features of genetic algorithm for plain text encryption
...Show More Authors

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref