Preferred Language
Articles
/
bsj-9029
An Observation and Analysis the role of Convolutional Neural Network towards Lung Cancer Prediction
...Show More Authors

Lung cancer is one of the most serious and prevalent diseases, causing many deaths each year. Though CT scan images are mostly used in the diagnosis of cancer, the assessment of scans is an error-prone and time-consuming task. Machine learning and AI-based models can identify and classify types of lung cancer quite accurately, which helps in the early-stage detection of lung cancer that can increase the survival rate. In this paper, Convolutional Neural Network is used to classify Adenocarcinoma, squamous cell carcinoma and normal case CT scan images from the Chest CT Scan Images Dataset using different combinations of hidden layers and parameters in CNN models. The proposed model was trained on 1000 CT Scan Images of cancerous and non-cancerous cells to find the best combination of parameters in CNN to predict lung cancer accurately.  The proposed system recorded the highest accuracy of 92.79%. In addition to that, the paper addresses 192 observations made using the CNN model. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Artificial Neural Network Model for Wastewater Projects Maintenance Management Plan
...Show More Authors

Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Role of Design And Decoration in Enriching Children’s Clothes
...Show More Authors

As the child is growing up, he goes through different phases which will be accompanied by physical and psychological changes. These changes set the basis for processes of designing and making children's clothes which in turn give its required benefits and meet the physiological, psychological and community needs. That will help provide the child with healthy physical and psychological growth.
The aim of this research is to recognize the decoration of clothes by colors and drawings and its role in clothes' richness and children's education. The research limits are objective, The limits are for female (3-5) years old. The research was done in teaching kindergarten in the college of education for women in 2016. The researchers found many

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Wed Oct 18 2023
Journal Name
Ieee Access
A New Imputation Technique Based a Multi-Spike Neural Network to Handle Missing Data in the Internet of Things Network (IoT)
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Comparison of Estimation Sonic Shear Wave Time Using Empirical Correlations and Artificial Neural Network
...Show More Authors

Wellbore instability and sand production onset modeling are very affected by Sonic Shear Wave Time (SSW). In any field, SSW is not available for all wells due to the high cost of measuring. Many authors developed empirical correlations using information from selected worldwide fields for SSW prediction. Recently, researchers have used different Artificial Intelligence methods for estimating SSW. Three existing empirical correlations of Carroll, Freund, and Brocher are used to estimate SSW in this paper, while a fourth new empirical correlation is established. For comparing with the empirical correlation results, another study's Artificial Neural Network (ANN) was used. The same data t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The role of the Arab tribe Rabi’a in the Umayyad period: The role of the Arab tribe Rabi’a in the Umayyad period
...Show More Authors

Abstract:
This tribe had lived in Iraq since the first century A.D. Persia tried to
keep this tribe away from Iraq, but without result. The tribe managed to get
victory against Persia in the battle of Dhyqar.
When the Muslims had come to conquer Iraq, Rabi’a welcomed them
and takes part in that action.
That tribe helped the caliph Ali in the Jammal and Sifffen wars in order
to remain Iraq the center of the Islamic caliphates this tribe had felt very sad
and sorrowful when the caliphate become to the Umayyad . This tribe did not
give up, so this tribe did what could be done to help those who had revolted
against the Umayyad. Rabi’a did that in order to get ride of the Mudriat alsham,
and favored Rabi

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The role of practices by the Managing of human resources on effectiveness of organizational crisis Management Described and analysis research for ministry of Iraqi interior
...Show More Authors

The practice by the  administration of human resources  on effectiveness of organization  crisis as two knowledge fields , it were be until now as center for many studies, but the collect it, study of relation between them ,and The role of practices  by the  administration of human resources  on effectiveness of organization  crisis administration  were considered a new study and first according to the available and showing  studies at this field .

The problem of this research was specified by answer for the question that deal for size of consciousness at the ministry of interior for import of&nbs

... Show More
View Publication Preview PDF
Crossref