Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of Alzheimer's disease. The system employs MRI and feature extraction methods to categorize images. This paper adopts the Alzheimer's Disease Neuroimaging Initiative (ADNI) dataset includes functional MRI and Positron-Version Tomography scans for Alzheimer's patient identification, which were produced for people with Alzheimer's as well as typical individuals. The proposed technique uses MRI brain scans to discover and categorize traits utilizing the Histogram Features Extraction (HFE) technique to be combined with the Canny edge to representing the input image of the Convolutional Neural Networks (CNN) classification. This strategy keeps track of their instances of gradient orientation in an image. The experimental result provided an accuracy of 97.7% for classifying ADNI images.
Coaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi
... Show MoreThis paper presents a novel inverse kinematics solution for robotic arm based on artificial neural network (ANN) architecture. The motion of robotic arm is controlled by the kinematics of ANN. A new artificial neural network approach for inverse kinematics is proposed. The novelty of the proposed ANN is the inclusion of the feedback of current joint angles configuration of robotic arm as well as the desired position and orientation in the input pattern of neural network, while the traditional ANN has only the desired position and orientation of the end effector in the input pattern of neural network. In this paper, a six DOF Denso robotic arm with a gripper is controlled by ANN. The comprehensive experimental results proved the appl
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreA common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MorePsychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the
... Show MoreConsider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8