Preferred Language
Articles
/
Shc5qpMBVTCNdQwCn-kn
ALL-FABNET: Acute Lymphocytic Leukemia Segmentation Using a Flipping Attention Block Decoder-Encoder Network
...Show More Authors

Melanoma, a highly malignant form of skin cancer, affects individuals of all genders and is associated with high mortality rates, especially in advanced stages. The use of tele-dermatology has emerged as a proficient diagnostic approach for skin lesions and is particularly beneficial in rural areas with limited access to dermatologists. However, accurately, and efficiently segmenting melanoma remains a challenging task due to the significant diversity observed in the morphology, pigmentation, and dimensions of cutaneous nevi. To address this challenge, we propose a novel approach called DenseUNet-169 with a dilated convolution encoder-decoder for automatic segmentation of RGB dermascopic images. By incorporating dilated convolution, our model improves the receptive field of the kernels without increasing the number of parameters. Additionally, we used a method called Copy and Concatenation Attention Block (CCAB) for robust feature computation. To evaluate the performance of our proposed framework, we utilized the International Skin Imaging Collaboration (ISIC) 2017 dataset. The experimental results demonstrate the reliability and effectiveness of our suggested approach compared to existing methodologies. Our framework achieved a high level of accuracy (98.38%), precision (96.07%), recall (94.32%), dice score (95.07%), and Jaccard score (90.45%), outperforming current techniques.

Scopus Crossref
View Publication
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Waste as a resource of economic resources: A case study using environmentalthe index MIP
...Show More Authors

Due to increased consumption of resources, especially energy it was necessary to find alternatives characterized by the same quality as well as being of less expensive, and most important of these alternatives are characterized by waste and the fact that humancannot stop consumption. So we  have consideredwaste as an  alternative and cheap economic resources and by using environmental index the MIP (input materials per unit ,unit / service) is based on the grounds that the product is not the end of itselfit is a product to meet the need  of a product or service, awarded a resource input and output within the five basic elements are the raw materials is ecological, Raw materials ecological, water, air and soil erosion for a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Functionalized multi-walled carbon nanotubes network sensor for NO2 gas detection at room temperature
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Implementation of Transmitter Zigbee System based on Wireless Sensor Network of IEEE 802.15.4 Standard
...Show More Authors

Abstract

 

Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Network Self-Fault Management Based on Multi-Intelligent Agents and Windows Management Instrumentation (WMI)
...Show More Authors

This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Role of System Strategic Learning Smart In Sustainability Success of Managing Network e-Business
...Show More Authors

Purpose: Determining and identifying the relationships of smart strategic education systems and their potential effects on sustainable success in managing clouding electronic business networks according to green, economic and environmental logic based on vigilance and awareness of the strategic mind.

Design: Designing a hypothetical model that reveals the role and investigating audit and cloud electronic governance according to a philosophy that highlights smart strategic learning processes, identifying its assumptions in cloud spaces, choosing its tools, what it costs to devise expert minds, and strategic intelligence.

Methodology:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 23 2011
Journal Name
International Journal Of The Physical Sciences
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Integrated Grasshopper Optimization Algorithm with Artificial Neural Network for Trusted Nodes Classification Problem
...Show More Authors

Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica

... Show More
View Publication
Scopus Clarivate Crossref