Preferred Language
Articles
/
3RcZPo8BVTCNdQwCcmQ8
TUMOR BRAIN DETECTION THROUGH MR IMAGES: A REVIEW OF LITERATURE
...Show More Authors

Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpose, the brain is partitioned into two distinct regions. This is considered to be one of the most important but difficult part of the process of detecting brain tumor. Hence, it is highly necessary that segmentation of the MRI images must be done accurately before asking the computer to do the exact diagnosis. Earlier, a variety of algorithms were developed for segmentation of MRI images by using different tools and techniques. However, this paper presents a comprehensive review of the methods and techniques used to detect brain tumor through MRI image segmentation. Lastly, the paper concludes with a concise discussion and provides a direction toward the upcoming trend of more advanced research studies on brain image segmentation and Tumor detection.

Scopus
Publication Date
Wed Mar 01 2017
Journal Name
جامعة كرميان
The effect of a training program for chemistry teachers based on the strategy of both sides of the brain together on the thinking patterns of their students
...Show More Authors

Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal: Ibn Al-haitham Journal For Pure And Applied Sciences
A Study the effect the direction of the distribution of lighting to improve Images in different lighting by using technique adaptive histogram equalization
...Show More Authors

Publication Date
Fri Jan 30 2026
Journal Name
Webology
Is the Stealth Marketing an Element of Promotion Mix? A Review of the Techniques
...Show More Authors

Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Nanotechnology, Science And Applications
Formulation and Characterization of Intranasal Drug Delivery of Frovatriptan-Loaded Binary Ethosomes Gel for Brain Targeting
...Show More Authors

Background: Frovatriptan succinate (FVT) is an effective medication used to treat migraines; however, available oral formulations suffer from low permeability; accordingly, several formulations of FVT were prepared. Objective: Prepare, optimize, and evaluate FVT-BE formulation to develop enhanced intranasal binary nano-ethosome gel. Methods: Binary ethosomes were prepared using different concentrations of phospholipid PLH90, ethanol, propylene glycol, and cholesterol by thin film hydration and characterized by particle size, zeta potential, and entrapment efficiency. Furthermore, in-vitro, in-vivo, ex-vivo, pharmacokinetics, and histopathological studies were done. Results: Regarding FVT-loaded BE, formula (F9) demonstrated the best paramet

... Show More
View Publication
Scopus (27)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Mon Sep 30 2024
Journal Name
Iraqi Journal Of Science
Effect of Atmospheric Mixing on Spectral Reflectivity in Sentinel Images of Baghdad Province
...Show More Authors

The lowest layer of the atmosphere is called the atmospheric mixed layer, characterized by small-scale, irregular air motions defined by winds that change in speed and direction. Aerosol radiative effects impact the atmospheric boundary layer (ABL), which holds most aerosols in the lower atmosphere. Aerosol absorption and scattering both lower the quantity of solar energy that reaches the ground, which has an impact on the spectral signature of the land coverings. In this study, 51 locations in downtown Baghdad were chosen for four different types of land cover (water bodies, farms, open areas, and residential areas) for Sentinel 2 satellite imagery, and the time the pictures were taken was 8:00 am ( 22 March, 22 June, 20 September,

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Applied Science & Technology
The Use of Cubic Bezier Interpolation, Biorthogonal Wavelet and Quadtree Coding to Compress Color Images
...Show More Authors

In this paper, an efficient method for compressing color image is presented. It allows progressive transmission and zooming of the image without need to extra storage. The proposed method is going to be accomplished using cubic Bezier surface (CBI) representation on wide area of images in order to prune the image component that shows large scale variation. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, bi-orthogonal wavelet transform is applied to decompose the residue component. Both scalar quantization and quad tree coding steps are applied on the produced wavelet sub bands. Finally, adaptive shift coding is applied to handle the remaining statistical redundancy and attain e

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
The effect of readings on the multiplicity of explanatory significance of a single Qur’anic word, a study through the interpretation of Ibn Attia al-Andalusi
...Show More Authors

The study aimed to clarify the meanings learned and inferred from reading books، letters and messages in Surat Al-Qur’an. The inductive method، the analytical method، and the deductive method، One of the most prominent results of the research: that the multiplicity of Qur’anic readings produces a variety and expansion in the meaning that has a clear impact on the interpretation by clarifying the meaning of the verse.

View Publication Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Perineural Invasion in Oral Squamous Cell Carcinoma in Relation to Tumor Depth
...Show More Authors

Background: The American Joint committee on Cancer in their 8th edition staging manual regarded perineural invasion as one of the most important prognostic factors for Lip and Oral Cavity Squamous Cell Carcinoma, it also incorporated tumor depth of invasion in defining tumor size category in the new staging system. This study was conducted to evaluate the frequency of perineural invasion in oral squamous cell carcinoma and the effect of approaching tumor depth in this process. Materials and Methods: fifty-four formalin fixed paraffin embedded tissue blocks of radical resections of Oral Squamous Cell Carcinoma were cut and stained with Hematoxylin and Eosin stain, then evaluated for perineural invasion, with estimation of tumor depth of i

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref