Preferred Language
Articles
/
jih-351
Detect The Infected Medical Image Using Logic Gates

   This paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process  images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate injury, this difference may be tooth decay or a broken bone , cancerous cells or infected gums, The X-OR gate is the best gates uses in this technique. Simulation program using visual basic has been in order to determine final results.
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Determination of the Impact of Electronic Health Information Systems upon Medical, Medical Backing and Administrative Business Fields in Al-Kindy Teaching Hospital

Objective(s): To determine the impact of the Electronic Health Information Systems upon medical, medical backing and administrative business fields in Al-Kindy Teaching Hospital and to identify the relationship between such impact and their demographic characteristics of years of employment, place of work, and education. Methodology: A descriptive analytical design is employed through the period of April 25th 2016 to May 28th 2016. A purposive "non- probability" sample of (50) subject is selected. The sample is comprised of (25) medical and medical backing staff and (25) administrative staff who are all

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Quantitative and Qualitative detect for cheat beef with chicken meat by immunological methods

beef and chicken meat were used to get Sarcoplasim, the chicken Sarcoplasim were used to prepare antibody for it after injected in rabbit, the antiserums activity were 1/32 by determined with Immune double diffusion test, the self test refer to abele for some antiserums to detected with beef sarcoplasim, which it mean found same proteins be between beef and chicken meat, which it refer to difficult depended on this immune method to detect for cheat of chicken meat with beef, so the antibody for beef sarcoplasim were removed from serum by immune absorption step to produce specific serum against chicken sarcoplasim that it used in Immune double diffusion test to qualitative detect for cheat beef with 5% chicken meat or more at least, and the

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Lubricants
Terahertz Time Domain Spectroscopy to Detect Different Oxidation Levels of Diesel Engine Oil

Diesel engine oil was subjected to thermal oxidization (TO) for six periods of time (0 h, 24 h, 48 h, 72 h, 96 h, and 120 h) and was subsequently characterized by terahertz time domain spectroscopy (THz-TDS). The THz refractive index generally increased with oxidation time. The measurement method illustrated the potential of THz-TDS when a fixed setup with a single cuvette is used. A future miniaturized setup installed in an engine would be an example of a fixed setup. For the refractive index, there were highly significant differences among the oxidation times across most of the 0.3–1.7 THz range.

Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
Scopus (49)
Crossref (47)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Scopus Crossref
View Publication
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Low computations in compression image schemes using Cache codebook based on Weber's law

In this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.

View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Embedding a Digitized Watermark Upon Colored Image Using Wavelet Transform with Comparative Technique

A special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed with

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2006
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The Anticipated Hazards Due To Errors In Using Laser In Medicine And Recommendations For The Safe Use Of Medical Laser Systems In Iraqi Hospitals.

Summary
On one hand, laser medical systems are very useful in several medical fields. They are used for diagnosis and treatment. In addition, they are used in medical researches.
On the other hand, laser hazards may cause irreversible injuries, especially eye injuries. Therefore the safe use of medical laser systems is very important to protect the laser
operators who are always exposed to laser hazards, and also to protect patients treated by medical laser. This academic research was designed to achieve the safe use of laser medical systems in Iraqi hospitals by:
a- Knowing the basic laser concepts. 
b- Concentrating on the responsibilities of the medical st

... Show More
Crossref
View Publication Preview PDF