Preferred Language
Articles
/
3RcZPo8BVTCNdQwCcmQ8
TUMOR BRAIN DETECTION THROUGH MR IMAGES: A REVIEW OF LITERATURE
...Show More Authors

Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by using different tools and techniques. However, this paper presents a comprehensive review of the methods and techniques used to detect brain tumor through MRI image segmentation. Lastly, the paper concludes with a concise discussion and provides a direction toward the upcoming trend of more advanced research studies on brain image segmentation and Tumor detection.

Scopus
Publication Date
Tue Sep 19 2017
Journal Name
Al-academy
Process of artistic conception of nature's images Between becoming and buration
...Show More Authors

This research deals with process of artistic conception of nature's images between becoming and buration, as an attempt to transfer the philosophical concepts to art via it's structural applications in forming the picture, due to the importance of these concepts which might be engaged with the vision of the artist in his own and subjective contention with the nature. The research consists of four chapters, first one included the problem of the research, importance, need to the research and the aim of the research represented by process of artistic conception of nature's images between becoming  and buration. Also included the limits of research and most important terms. Second chapter included theoretical frame that consists of thre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Unit Price and Cost Estimation Equations through Items Percentage of Construction Works in a Desert Area
...Show More Authors

This research will cover different aspects of estimating process of construction work in a desert area. The inherent difficulties which accompany the cost estimating of the construction works in desert environment in a developing country, will stem from the limited information available, resources scarcity, low level of skilled workers, the prevailing severe weather conditions and many others, which definitely don't provide a fair, reliable and accurate estimation. This study tries to present unit price to estimate the cost in preliminary phase of a project.  Estimations are supported by developing mathematical equations based on the historical data of maintenance, new construction of managerial and school projects.

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 27 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Immunohistochemical assessment of tumor suppressor gene Wwox in relation to proliferative marker KI67 proteins expression in giant cell lesions of the jaws and giant cell tumor of long bones
...Show More Authors

Background: Peripheral giant cell lesion (PGCL) and central giant cell lesion (CGCL) of the jaws have a distinct clinical behavior.Giant cell tumour (GCT) is a benign locally aggressive neoplasm affects the long bones. Both lesions are characterized histologically by multinucleated giant cells in a background of ovoid to spindle-shaped mesenchymal cells. The WW domain-containing oxidoreductase (WWOX) gene is located at 16q23.1–16q23.2, a region that spans the second most common human fragile site, FRA16D, at 16q23.2.The Ki-67 antigen is a nuclear protein that is associated with and may be necessary for cellular proliferation.Ki-67 protein is present during all active phases of the cell cycle (G1, S, G2, and mitosis), but is absent fr

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 14 2019
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Short Term Effectiveness of Gamma Knife Radiosurgery in the Management of Brain Arteriovenous Malformation
...Show More Authors

AIM: To evaluate the short-term effectiveness of Gamma knife radiosurgery as a modality of treatment of brain arteriovenous malformation. METHODS: Sixty-three patients with arteriovenous brain malformations underwent Gamma knife radiosurgery included in this prospective study between April 2017 and September 2018 with clinical and radiological with MRI follow up was done at three months and six months post-Gamma knife radiosurgery. By the end of the 12th-month post-Gamma knife radiosurgery, the patients were re-evaluated using digital subtraction angiography co-registered with M.R.I. During the 12 months follow up, CT scan or MRI was done at any time if any one of the patients᾽ condition deteriorated or developed signs and s

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sat Apr 08 2023
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
How to Estimate the Major Petrophysical Properties: A Review
...Show More Authors

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Proceedings Of The Eleventh International Network Conference (inc 2016)
A review on power consumption reduction techniques on OFDM
...Show More Authors

Scopus (2)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Wed Sep 11 2024
Journal Name
International Journal Of Multidisciplinary Science And Advanced Technology
Superbugs (Multi Drug Resistant Bacteria to antibiotics): A Review
...Show More Authors

Preview PDF
Publication Date
Mon Oct 06 2025
Journal Name
Engineering, Technology & Applied Science Research
Encased Pultruded GFRP Beams with Shear Connectors: A Review
...Show More Authors

This study examines the structural performance of concrete-encased pultruded Glass Fiber Reinforced Polymer (GFRP) I-sections with shear connections. It specifically focuses on how different parameters affect the latter’s ductility, flexural strength, and load-carrying capacity. The key variables studied include various shear connector types, spacing, and geometries, as well as the compressive strength of concrete and the properties of GFRP. The finite element modeling and experimental validation show that the shear connectors significantly improve the ductility, ultimate capacity, and load transmission efficiency. The present review emphasizes that the shear connectors greatly enhance the structural performance when they are prop

... Show More
View Publication
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref