Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of Alzheimer's disease. The system employs MRI and feature extraction methods to categorize images. This paper adopts the Alzheimer's Disease Neuroimaging Initiative (ADNI) dataset includes functional MRI and Positron-Version Tomography scans for Alzheimer's patient identification, which were produced for people with Alzheimer's as well as typical individuals. The proposed technique uses MRI brain scans to discover and categorize traits utilizing the Histogram Features Extraction (HFE) technique to be combined with the Canny edge to representing the input image of the Convolutional Neural Networks (CNN) classification. This strategy keeps track of their instances of gradient orientation in an image. The experimental result provided an accuracy of 97.7% for classifying ADNI images.
Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show Moreالغلط في القانون الانجليزي على انواع ثلاثة (غلط مشترك Common mistake ) يقع فيه الطرفان مع علم كل منهما بنية الآخر ويقبلها دون ان يشوب الاتفاق نقص او يعتريه تحفظ ، و(غلط من الجانبين Mutual mistake) يكون كل متعاقد واقعا في غلط فيما يتعلق بما قصده الآخر، فيقدم كل منهما عرضاً مخالفاً للآخر و(غلط من جانب واحدUnliteral mistake ) يقع فيه احد المتعاقدين فقط ويكون المتعاقد الآخر اما عالماً بالغلط او يفترض انه عالم به . فإذا دفع احد المتعاقدين
... Show MoreCompensation is one of the most discussed topics in the arena of civil law that requires research About solutions to the damages that arise from the promotion of extremist ideas, which were imposed by the developments taking place in society and the increasing escalation of accidents and their increasing risks, which now threaten individuals and their property on a daily basis in large numbers, as the injured party always seeks to require quick compensation from the person responsible for the damage that satisfies his desires and removes the effects of the damage caused, The importance of compensation increases if the violation affects a person’s physical integrity or his right to life, which is the highest right recognized for humans in
... Show MoreBilastine (BL) is a novel non-sedating second-generation antihistamine, and its bioavailability is about 60%. Objective: To compare the bioavailability of prepared oral self-nanoemulsions of BL (BL-SNE) with that of pure BL and marketed tablets. Methods: Four groups of Wistar rats were used in this study, each with six rats weighing between 200 and 250 g. They were treated orally using a a gavage tube. The groups were fed either with conventional tablets ("Alerbix®") after being ground and dispersed with deionized water (DIW), treated with BL-SNE or fed with pure BL powder suspension. The fourth group did not receive any medication. The concentration of BL in the rat’s plasma was measured using HPLC. We used Trandolapril as an an interna
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More Fusobacterium are compulsory anaerobic gram-negative bacteria, long thin with pointed ends, it causes several illnesses to humans like pocket lesion gingivitis and periodontal disease; therefore our study is constructed on molecular identification and detection of the fadA gene which is responsible for bacterial biofilm formation. In this study, 10.2% Fusobacterium spp. were isolated from pocket lesion gingivitis. The isolates underwent identification depending on several tests under anaerobic conditions and biochemical reactions. All isolates were sensitive to Imipenem (IPM10) 42.7mm/disk, Ciprofloxacin (CIP10) 27.2mm/disk and Erythromycin (E15) 25mm/disk, respectively. 100% of
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show More