Preferred Language
Articles
/
bsj-5965
Diagnosing COVID-19 Infection in Chest X-Ray Images Using Neural Network
...Show More Authors

With its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques.  This research results showed that rapidly evolved Artificial Intelligence (AI) -based image analysis can accomplish high accuracy in detecting coronavirus infection as well as quantification and illness burden monitoring.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Value of random urinary calcium to creatinine ratio in diagnosing hypercalciuria in children with nocturnal enuresis
...Show More Authors

Background:Nocturnal Enuresis is a common problem affecting 20% of five years old children and up to 2% of adolescent and young adult. Although it is a self limiting benign condition, it has social and psychological impact on the child and his family. Many pathophysiological theories had been suggested, but none is confirmed. Hypercalciuria has been suggested to be associated with higher incidence of nocturnal enuresis. Objectives:The aim of our study to test the value of Ca/Cr ratio, on random urine sample, in diagnosing hypercalciuria in enuretic children. Type of study: Cross sectional study.Methods:Forty four enuretic children were enrolled in this study and forty five children without nocturnal enuresis were taken as control group.

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
مجلة کلية التربية بالعريش
تحليل مستويات نوبات الهلع من جائحة کورونا COVID-19 باستخدام نظرية الاستجابة المفردة :دراسة تشخصية فارقة على عينات من المجتمع العربي
...Show More Authors

View Publication
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
Adaptive Smoothing Technique for Remotely Sensed Images Enhancement
...Show More Authors

Spatial and frequency domain techniques have been adopted in this search. mean
value filter, median filter, gaussian filter. And adaptive technique consists of
duplicated two filters (median and gaussian) to enhance the noisy image. Different
block size of the filter as well as the sholding value have been tried to perform the
enhancement process.

View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Nψβ and Nβψ - Closed sets in Neutrosophic Topological spaces
...Show More Authors

The aim of this paper is to introduce the concept of N  and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Nov 21 2022
Journal Name
College Of Islamic Sciences
Sources of audio images in the poetry of the Islamic
...Show More Authors

      الحمدُ للهِ رب العالمين ، والصلاة والسلام على نبيه الأمين محمد r وعلى آله الطيبين الطاهرين ، وأصحابه الغر الميامين:

             تعد الصورة السمعية مفهوما بيانيا نجده في البلاغة العربية واضحاً مؤثرا، مؤديا دورا جوهريا في إيصال الفكرة التي يروم الأديب إيصالها إلى المتلقي   ولا تبدو السمعية واضحة إلاّ إذا نظر إليها في حالة أدبيه تهز كيان الشاعر &nbsp

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Indian Journal Of Clinical Biochemistry
Farnesoid X Receptor-Mediated Bile Acids Regulation in Cholestasis
...Show More Authors

The main process, for the elimination of cholesterol from the human body, involves the alteration of cholesterol into bile acid (BA), by the liver. The farnesoid X receptor (FXR), a member of the nuclear receptor superfamily, is essential for the regulation of BA, glucose, and lipid metabolism. It is largely found in the liver, intestines, kidney, and adrenal glands, and to a smaller degree in the heart and adipose tissue. The binding locations, of the FXR, are in close proximity to formerly undisclosed target genes, with distinctive activities associated with transcriptional regulators, autophagy, apoptosis, hypoxia, inflammation, RNA processing, and a number of cellular signaling pathways. The preservation of BA homeostasis, by the FXR, e

... Show More
View Publication
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Thu May 30 2024
Journal Name
Iraqi Journal Of Science
A Review Study on Forgery and Tamper Detection Techniques in Digital Images
...Show More Authors

Digital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More