Preferred Language
Articles
/
bsj-6782
Breast Cancer MRI Classification Based on Fractional Entropy Image Enhancement and Deep Feature Extraction
...Show More Authors

Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature extraction step to enhance and preserve the fine details of the breast MRI scans boundaries by using fractional integral entropy FIE algorithm, to reduce the effects of the intensity variations between MRI slices, and finally to separate the right and left breast regions by exploiting the symmetry information. The obtained features are classified using a long short-term memory (LSTM) neural network classifier. Subsequently, all extracted features significantly improves the performance of the LSTM network to precisely discriminate between pathological and healthy cases. The maximum achieved accuracy for classifying the collected dataset comprising 326 T2W-TSE images and 326 STIR images is 98.77%. The experimental results demonstrate that FIE enhancement method improve the performance of CNN in classifying breast MRI scans. The proposed model appears to be efficient and might represent a useful diagnostic tool in the evaluation of MRI breast scans.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 02 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Salivary tumor marker CA15-3 and selected elements in relation to oral health status among a group of breast cancer women
...Show More Authors

Background: Breast cancer is the commonest type of malignancy worldwide and in Iraq. It is a serious disease that affects the general health and cause systemic changes that affect the physical and chemical properties of saliva leading to adverse effects on oral health. This study was conducted toassess the tumor marker CA15-3 and selected elements in saliva and their relation to oral health status among breast cancer patients compared to control group. Materials and Methods: The total sample consisted of 60 women aged 35-45 years. 30 women were newly diagnosed with breast cancer before taking any treatment and surgery (study group) and 30 women without clinical signs and symptoms of breast cancer as a control group. Dental caries was record

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
International Journal Of Pharmaceutical Research
Study of aminoacy lt ran-synthetasecomplex interacting multifunctional protein 1 and liver enzymes in iraqi women with breast cancer undergoing chemotherapy
...Show More Authors

Breast carcinoma is one of the greatest popular neoplasms in females. It is a major reason of demise in the world, and it is the first cancer in ranking diagnosed in Iraqi women. This study aimed to determine aminoacyltRAN-synthetase complex interacting multifunctional protein 1 and liver enzymes levels in Iraqi females with stage II breast malignance, and study the effect of chemotherapy (after surgery) on these markers. This study included 50 females patients with stage II breast malignance (before and after surgery and second dose of chemotherapy) attending the Oncology Teaching Hospital in Medical City/ Baghdad, in addition to 20 persons as controller group were chosen without any chronic diseases. Their ages ranged from (30-55) years.

... Show More
Scopus
Publication Date
Thu Aug 01 2024
Journal Name
Baghdad Science Journal
Synthesis, Structural, Morphological Characterization, and Cytotoxicity Assays of Metal Complexes Decorated SiO2 Nanoparticles Against Breast Cancer Cell Lines (MDA-MB-231)
...Show More Authors

في هذا البحث تم تحضير المركبات المعدنية الجديدة لأيونات البلاتين (الرباعي) و الذهب (الثلاثي) مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين . تم استخدام المعقدات بعد ذلك كمصدر  لتحضير جزيئات                              عن طريق ترسيب المعقدات على مسام دقائق السيليكا النانوية.                                                                      Si/Au2O3 Si/PtO2  تم تشخيص الليكاند و معقداته

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Beran estimator using Nadaraya-Waston and Prestley-chao weights in estimating the conditional survival function of breast cancer patients
...Show More Authors

This study includes the application of non-parametric methods in estimating the conditional survival function of the Beran method using both the Nadaraya-Waston and the Priestley-chao weights and using data for Interval censored and Right censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy Considering age is continuous variable, through using (MATLAB)  use of the (MSE) To compare weights The results showed a superior weight (Nadaraya-Waston) in estimating the survival function and condition of Both for chemotherapy and radiation therapy.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 09 2022
Journal Name
Engineering, Technology & Applied Science Research
A Semi-Empirical Equation based on the Strut-and-Tie Model for the Shear Strength Prediction of Deep Beams with Multiple Large Web Openings
...Show More Authors

The behavior and shear strength of full-scale (T-section) reinforced concrete deep beams, designed according to the strut-and-tie approach of ACI Code-19 specifications, with various large web openings were investigated in this paper. A total of 7 deep beam specimens with identical shear span-to-depth ratios have been tested under mid-span concentrated load applied monotonically until beam failure. The main variables studied were the effects of width and depth of the web openings on deep beam performance. Experimental data results were calibrated with the strut-and-tie approach, adopted by ACI 318-19 code for the design of deep beams. The provided strut-and-tie design model in ACI 318-19 code provision was assessed and found to be u

... Show More
View Publication
Scopus (6)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Effect of Electrolyte Composition on Structural and Photoelectrochemical Properties of Titanium Dioxide Nanotube Arrays Synthesized by Anodization Technique
...Show More Authors

The present work involves studying the effect of electrolyte composition [@1= 0.5 wt.%  NH4F / 5% H2O / 5% Glycerol (GLY)/ 90%  Ethylene Glycol (EG)] and [ @2= 0.5 wt. % NH4F / 5% H2O / 95%  Ethylene Glycol (EG)]  on the structural and photoelectrochemical properties of titania nanotubes arrays (TNTAs). TNTAs substrates were successfully carried out via anodization technique and were carried out in 40 V for one hour in different electrolytes (@1, and @2). The properties of physicochemical of TNTAs were distinguished via an X-ray Diffractometer (XRD), Field Emission Scanning Electron Microscope (FESEM), an Energy Dispersive X-ray (EDX), and UV–visible diffuse reflectance. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Gjra - Global Journal For Research Analysis
Inclination of the Lumbosacral angle in normal individuals: An MRI study
...Show More Authors

Inclination Of The Lumbosacral Angle In Normal Individuals: An Mri Study,GJRA - Global Journal For Research Analysis(GJRA) GJRA is a double reviewed monthly print journal that accepts research works. 36572+ Manuscript submission, 9855+ Research Paper Published, 100+ Articles from over 100 Countries

View Publication Preview PDF