Preferred Language
Articles
/
bsj-5597
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breathing difficulty) used to diagnose the person being infected by COVID-19 virus or not. Secondly, this approach divides the infected peoples into four classes, based on their immune system risk level (very high degree, high degree, mild degree, and normal), and using two indices of age and current health status like diabetes, heart disorders, or hypertension. Where, these people are graded and expected to comply with their class regulations. There are six important COVID-19 virus infections of different classes that should receive immediate health care to save their lives. When the test is positive, the patient age is considered to choose one of the six classifications depending on the patient symptoms to provide him the suitable care as one of the four types of suggested treatment protocol of COVID-19 virus infection in COVID-19 DSS application. Finally, a report of all information about any classification case of COVID-19 infection is printed where this report includes the status of patient (infection level) and the prevention protocol. Later, the program sends the report to the control centre (medical expert) containing the information. In this paper, it was suggested the use of C4.5 Algorithm for decision tree.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
Influence of yeast and intercropping system on growth and yield traits of pea
...Show More Authors

Scopus (8)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Utilizing Home Pregnancy Test Kits for Diagnosis of Leaking Liquor
...Show More Authors

Before the start of delivery, any membranes rupture could be named as a premature rupture of membranes (PROM), which may need special obstetrical interactions to minimize perinatal complications, it is important topromptly diagnose PROM, the method used should be accurate, cheap, simple, and widely available. This was exactly the idea behind this study to use an ordinary pregnancy test kit aiming to confirm presence of PROM.Over a 6 months’ period, 60 pregnant women with a history of leaking liquor and a positive speculum examination for amniotic fluid pooling were collected prospectively and compared with other 60 women (control group) with uneventful pregnancy. Majority of patients with positive leaking liquor signs and symptoms had a p

... Show More
View Publication
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the orig

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
The role of spiral Computerized Tomography in diagnosis of stroke
...Show More Authors

Objective: The aim of this study is to determine the role of spiral Computerized Tomography in the diagnosis and
detection the types of stroke.
Methodology: One hundred sixty two patients (162) (99 males and 63 females) their ages ranging from (13 – 80)
year, all of them are suffering from stroke. They were collected randomly from spiral Computerized Tomography
unit in Baquba Teaching hospital during the period from November / 2010 to December / 2011 .All the patients
were examined clinically and then done spiral Computerized Tomography examination.
Results : The results of this study showed that the stroke effected different age groups and both sex but males is
more affected than the females .The results of spiral

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 05 2025
Journal Name
2025 Ieee 4th International Conference On Computing And Machine Intelligence (icmi)
From Pixels to Diagnosis: AI-Powered CNN for Pneumonia Detection
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Oct 14 2022
Journal Name
Diagnostics
Determination of the Accuracy of Salivary Biomarkers for Periodontal Diagnosis
...Show More Authors

Background: We aimed to investigate the accuracy of salivary matrix metalloproteinases (MMP)-8 and -9, and tissue inhibitor of metalloproteinase (TIMP)-1 in diagnosing periodontitis and in distinguishing periodontitis stages (S)1 to S3. Methods: This study was a case–control study that included patients with periodontitis S1 to S3 and subjects with healthy periodontia (controls). Saliva was collected, and then, clinical parameters were recorded, including plaque index, bleeding on probing, probing pocket depth, and clinical attachment level. Diagnosis was confirmed by assessing the alveolar bone level using radiography. Salivary biomarkers were assayed using an enzyme-linked immunosorbent assay. Results: A total of 45 patients (15

... Show More
View Publication
Scopus (32)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Audio Classification Based on Content Features
...Show More Authors

Audio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (28)
Crossref (24)
Scopus Clarivate Crossref