In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial lung CT-scans into two groups (COVID-19 and NonCOVID-19) had been proposed. A dataset used is 960 slices of CT scan collected from Iraqi patients /Ibn Al-Nafis teaching hospital. The performance metrics are used in this study (accuracy, recall, precision, and F1 scores). The results indicate that the proposed approach generated a high-quality model for the collected dataset, with an overall accuracy of 98.95% and an overall recall of 97 %.
Some new 2,5-disubsituted-1,3,4-oxadiazole derivatives with azo group were synthesized by known reactions sequence . The structure of the synthesized compounds were confirmed by physical and spectral means .
Background: The purpose of the current study was to evaluate the efficacy of a new orthodontic bonding system (Beauty Ortho Bond) involving the shear bond strength in dry and wet environments, and adhesion remnant index (ARI) scores evaluation in regard to other bonding systems (Heliosit and Resilience Orthodontic Adhesives). Materials and methods: Sixty defect free extracted premolars were randomly divided into six groups of 10 teeth each, mounted in acrylic resin, three groups for a dry environment and three for a wet one. Shear bond strength test was performed with a cross head speed of 0.5 mm/min, while surfaces of enamel and bracket-adhesive-enamel surfaces were examined with stereomicroscope For ARI scores evaluation. Data were analyz
... Show MoreA study of the Torymid collection of Iraq. resulted in undescribed species of the genus
Liodontonierus Gah. L. longicorpus sp. n. with 2 figures.
The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
Verrucae vulgares are commonly encountered. The present work is designed in an attempt to build a systematic procedure for treating warts by carbon dioxide laser regarding dose parameters, application parameters and laser safety.
Patients and Methods: The study done in the department of dermatology in Al-Najaf Teaching Hospital in Najaf, Iraq. Forty-two patients completed the study and follow up period for 3 months. Recalcitrant and extensive warts were selected to enter the study. Carbon dioxide laser in a continuous mode, in non-contact application, with 1 mm spot size was used. The patients were divided into two groups. The first group of patients consisted of 60 lesions divided to 6 equal groups, in whom we use different outputs a
This paper deals with constructing mixed probability distribution from mixing exponential