—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when combined principal component analysis and feed forward back propagation neural network. This work has investigated the ability to improve the CAD system in order to use in detection abnormality even with low cost diagnosis methods (such as mammogram images or X-ray). The results show that the reduction of correlated details within the training data by using the PCA method can enhance the recognition performance. The performance of the neural network diagnostic to discriminate the normal cases from cancerous cases, evaluated by using recognition analysis show a high accuracy in detection. The proposed approach can be considered as a potential tool for diagnosis breast cancer from x-ray and mammography images and prediction for nonexperts and clinicians.
The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreThis study was carried out in order to determine the toxic, mutagenic and antimutagenic effects for Mallow (Malva parviflora) in comparison to its mutagenic effect of Ultraviolet (UV) because it is consider physical mutagen by using parameters for the extract pri , with , post UV exposure by using bacterial system (G-system). The used system consisted of three isolates G3 Bacillus spp., G12 Arthrobacter spp. and G27 Brevibacterium spp.. The study depended on recording survival fraction (Sx) for studying the effects and induction of Streptomycin and Refampicin resistance mutants as a genetic markers.Water Extract was prepared from fresh and dry mallow leaves, stems, flowers and roots, in optimum concentration equal to (125µg/ml) which is
... Show MoreBackground. Handball is a team sport that demands quick reflexes and precise motor skills, particularly in shooting. Players' ability to shoot accurately and swiftly while stationary makes upper limb reaction time crucial for success. Objectives. The research objective is to study the relationship between the motor time of the muscles of the arms and the index of accuracy of shooting from constancy in fourth-stage students in handball. Methods. The researchers used the descriptive method because it is one of the methods used in the research on a sample of students of the fourth stage of the college of Physical Education and Sports Sciences, where the sample consisted of 29 male students from the community of origin, 43 students. Results. Th
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreAqueous Two Phase System (ATPS) or liquid-liquid extraction is used in biotechnology to recover valuable compounds from raw sources. In Aqueous Two-Phase Systems, many factors influence the Partition coefficient, K, (which is the ratio of protein concentration in the top phase to that in the bottom phase) and the Recovery percentage (Rec%). In this research, two systems of ATPS were used: first, polyethylene glycol (PEG) 4000/Sodium citrate (SC), and the second, PEG8000/ Sodium phosphate (SPH), for the extraction of Bovine Serum Albumin (BSA). The behavior of Rec% and K of pure (BSA) in ATPS has been investigated throughout the study by the effects of five parameters: temperature, concentration of polyethylene glycol (P
... Show MoreThis investigation aims to study some properties of lightweight aggregate concrete reinforced by mono or hybrid fibers of different sizes and types. In this research, the considered lightweight aggregate was Light Expanded Clay Aggregate while the adopted fibers included hooked, straight, polypropylene, and glass. Eleven lightweight concrete mixes were considered, These mixes comprised of; one plain concrete mix (without fibers), two reinforced concrete mixtures of mono fiber (hooked or straight fibers), six reinforced concrete mixtures of double hybrid fibers, and two reinforced concrete mixtures of triple hybrid fibers. Hardened concrete properties were investigated in this study. G
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More