Preferred Language
Articles
/
1hctP48BVTCNdQwCxmVA
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when diagnosing a tissue sample. Small, unnoticeable changes in pixel density may indicate the beginning of cancer or tear tissue in the early stages. These details even expert pathologists might miss. Artificial intelligence (A.I.) and D.L. revolutionized radiology by enhancing efficiency and accuracy of both interpretative and non-interpretive jobs. When you look at AI applications, you should think about how they might work. Convolutional Neural Network (C.N.N.) is a part of D.L. that can be used to diagnose knee problems. There are existing algorithms that can detect and categorize cartilage lesions, meniscus tears on M.R.I., offer an automated quantitative evaluation of healing, and forecast who is most likely to have recurring meniscus tears based on radiographs.

Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
The position of women In Literary Literature Models of the Arabic and Kurdish literature
...Show More Authors

This research deals with the topic of "the status of women" in the literature of Sufism. The researcher cites a bundle of mystical yarns, and examples of verses and poems from this high literature that look at women with reverence and appreciation. The researcher tried to find an appropriate explanation and away from the arbitrariness of the symbols used by the poets of Islamic Sufism In their poems.

    The research is considered a comparative study of the Arabic and Kurdish dialects, by selecting six famous poets from the literature of literature, three of them from Arabic literature, and the other three from Kurdish literature, so the research is di

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
College Of Islamic Sciences
The position of women In Literary Literature Models of the Arabic and Kurdish literature
...Show More Authors

This research deals with the topic (the position of women) in the literature literature, and the researcher cites a bouquet of woolen yarn, examples of verses and poems from this fine literature that looks at the woman with respect and appreciation. In their poems.
The research is a comparative search for Arab and Kurdish literature, by selecting six famous poets in the literature, three of them are from Arabic literature, and the other three are from Kurdish literature, and thus the research is divided into two subjects and six demands.
Finally, the researcher tried to set a brick that would be an entry point to find an indicative explanation and a suitable explanation that would break those symbols and signs that caused the exp

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 26 2024
Journal Name
Zac Conference Series: Social Sciences And Humanities
A Comparative Study of Postwar Literature (Iranian Defense and Vietnam’s War) a Komunyakaa’s and Aminpour’s Poems
...Show More Authors

The comparative study tries to find the common points in two different authors’ works and in this kind of studying so many other common but the hidden points may be revealed. Postwar literature is somehow one of the best literary genres for finding the common factors and features that the poets have tried to present in their works elements such as desire to be winner, cruelty, inhumanity, and absurdity of the war.  The Iranian poet late Qaisar Aminpour(1961-2007)  and Yusef Komunyakaa ( 1947) from  Bogalusa, Louisiana, are among the great American and Iranian  poets whose works so many times have been  interpreted and analyzed. The finding the outstanding and the most important points and themes in the postwar poems of these

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Radiology Case Reports
Intradural extra-medullary spinal cord tumor after dorso-lumbar spine fixation following 12th dorsal vertebra burst fracture: A case report with literature review
...Show More Authors

View Publication
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Tue Jun 25 2024
Journal Name
Biomedical And Pharmacology Journal
Psidium guajava: A Review on Its Pharmacological and Phytochemical Constituents
...Show More Authors

Psidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Wed Jun 24 2020
Journal Name
Neuroimaging - Neurobiology, Multimodal And Network Applications
Electroencephalogram Based Biomarkers for Detection of Alzheimer’s Disease
...Show More Authors

Alzheimer’s disease (AD) is an age-related progressive and neurodegenerative disorder, which is characterized by loss of memory and cognitive decline. It is the main cause of disability among older people. The rapid increase in the number of people living with AD and other forms of dementia due to the aging population represents a major challenge to health and social care systems worldwide. Degeneration of brain cells due to AD starts many years before the clinical manifestations become clear. Early diagnosis of AD will contribute to the development of effective treatments that could slow, stop, or prevent significant cognitive decline. Consequently, early diagnosis of AD may also be valuable in detecting patients with dementia who have n

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
Increasing validation accuracy of a face mask detection by new deep learning model-based classification
...Show More Authors

During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve

... Show More
Crossref (4)
Crossref