<p>Combating the COVID-19 epidemic has emerged as one of the most promising healthcare the world's challenges have ever seen. COVID-19 cases must be accurately and quickly diagnosed to receive proper medical treatment and limit the pandemic. Imaging approaches for chest radiography have been proven in order to be more successful in detecting coronavirus than the (RT-PCR) approach. Transfer knowledge is more suited to categorize patterns in medical pictures since the number of available medical images is limited. This paper illustrates a convolutional neural network (CNN) and recurrent neural network (RNN) hybrid architecture for the diagnosis of COVID-19 from chest X-rays. The deep transfer methods used were VGG19, DenseNet121, InceptionV3, and Inception-ResNetV2. RNN was used to classify data after extracting complicated characteristics from them using CNN. The VGG19-RNN design had the greatest accuracy of all of the networks with 97.8% accuracy. Gradient-weighted the class activation mapping (Grad-CAM) method was then used to show the decision-making areas of pictures that are distinctive to each class. In comparison to other current systems, the system produced promising findings, and it may be confirmed as additional samples become available in the future. For medical personnel, the examination revealed an excellent alternative way of diagnosing COVID-19.</p>
The marshes are one of the important environmental features affecting human and animal systems, so the studying of changes they undergo is one of the important topics. This study is concerned with the changes occurring in the Al Saadya marsh for the period from 1987 to 2017 exclusively in the winter season (the marshes’ revival season in Iraq revive). In order to inspect the changes in this marsh, we choose 7 years to cover the study period as a criterion years, namely 1987, 1990, 1995, 2000, 2007, 2014 and 2017. The “Maximum Likelihood” classifier was used to separate the stacked land cover features, where the minimum overall accuracy ratio that recorded for all years of study was 96%. The results revealed that Al-Saadya marsh went t
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreObjective: To determine the quality assurance for maternal and child health care services in Baghdad City.
Methodology: A descriptive study is conducted throughout the period of November 28th 2008 to October 10th
2009. A simple random sample of (349) is selected through the use of probability sampling approach. The study
sample was divided into four groups which include (220) consumers, (35) medical staff, (72) nursing staff and (22)
organization structure (primary health care centers). Data were collected through the use of assessment tools. It was
comprised of four questionnaires and overall items included in these questionnaires are (116) items. The study
included assessment of organization structure. Data were colle
The work includes fabrication of undoped and silver-doped nanostructured nickel oxide in form thin films, which use for applications such as gas sensors. Pulsed-laser deposition (PLD) technique was used to fabricate the films on a glass substrate. The structure of films is studied by using techniques of x-ray diffraction, SEM, and EDX. Thermal annealing was performed on these films at 450°C to introduce its effect on the characteristics of these films. The films were doped with a silver element at different doping levels and both electrical and gas sensing characteristics were studied and compared to those of the undoped films. Reasonable enhancements in these characteristics were observed and attributed to the effects of thermal annealing
... Show MoreA concept of indoor solar illumination is described and simulated. The solar illumination system is composed of a tracking primary reflector, a selective secondary reflector, a visible light guide and a scattering solid glass tube fixture. Each part of the solar illumination system is optically suited and compatible with other parts to realize high efficiency. The simulation is conducted for Baghdad city for a library hall. Two major days over a year are chosen to investigate the illumination system for acceptable visible light level for reading hall. The two days are: summer solstice day and winter solstice day at 8:00 AM and 12:00 PM for each. Research results showed that the design of the solar system is achieved on the base of minimu
... Show MoreThis paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela
... Show MoreThe role of relaxation program for reducing anxiety of patients in dental clinic
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreEvolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E
... Show More