Preferred Language
Articles
/
ijp-769
Early detection of breast cancer mass lesions by mammogram segmentation images based on texture features
...Show More Authors

Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extraction of features like mass lesions in mammograms for early detection of breast cancer. The proposed technique is based on a four-step procedure: (a) the preprocessing of the image is done, (b) regions of interest (ROI) specification, (c) supervised segmentation method includes two stages performed using the minimum distance (MD) criterion, and (d) feature extraction based on Gray level Co-occurrence matrices GLCM for the identification of mass lesions. The method suggested for the detection of mass lesions from mammogram image segmentation and analysis was tested over several images taken from Al-Ilwiya Hospital in Baghdad, Iraq. The proposed technique shows better results

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 31 2015
Journal Name
International Journal Of Research In Applied, Natural And Social Sciences
The Influence of Premenopausal Simple Hysterectomy on Bone Mass Density
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Research Journal Of Pharmacy And Technology
Molecular Genetic variability in the D-loop region for females with Breast Cancer and the effect of the Chemotherapy
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Indian Journal Of Public Health Research & Development
A Comparative Study of Vitamin D Levels and Some Biochemical Parameters between Healthy and Breast Cancer in Iraqi Females.
...Show More Authors

Breast cancer is one of the most widespread cancers,depending on World Health Organization, cancer calculated for approximately 7.6 million incidences in 2008, whoever expected elevation in incidence is about 13.1 million in 2030. So that the current research investigates vitamin D role in the occurrence of this disease and explains if vitamin D has a positive effect on the incidence of disease, as well as measuring parathyroid hormone and estrogen levels. Three groups were included in this analysis: control healthy women, benign and malignant breast tumor women. All cases that were selected at the beginning of the disease diagnosis. According to statistical values vitamin D showed highly significant (P<0.001) decrease in benign (3.74±2.33

... Show More
Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Fri Feb 21 2025
Journal Name
2025 First International Conference On Advances In Computer Science, Electrical, Electronics, And Communication Technologies (ce2ct)
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems
...Show More Authors

The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 04 2025
Journal Name
Microbes And Infectious Diseases
A preclinical evaluation of the response of repairing the DNA of MCF7 breast cancer cells after exposure to probiotic bacteria
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Extraction and mass transfer study of Cupressus sempervirens L. oil by hydro-distillation method
...Show More Authors

The extraction of Cupressus sempervirens L. or cypress essential oil was studied in this paper. This cypress oil was extracted by using the hydro-distillation method, using a clevenger apparatus. Cupressus sempervirens L. leaves were collected from Hit city in Al-Anbar province – Iraq. The influences of three important parameters on the process of oil extraction; water which used as a solvent to the solid ratio (5:1 and 14:1 (ml solvent/g plant), temperature (30 to 100 °C) and processing time, were examined to obtain the best processing conditions to achieve the maximum yield of the essential oil. Also, the mathematical model was described to calculate the mass transfer coefficient. Therefore, the best conditions, that were obtained in

... Show More
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Dec 08 2021
Journal Name
J. Inf. Hiding Multim. Signal Process.
Predication of Most Significant Features in Medical Image by Utilized CNN and Heatmap.
...Show More Authors

The growth of developments in machine learning, the image processing methods along with availability of the medical imaging data are taking a big increase in the utilization of machine learning strategies in the medical area. The utilization of neural networks, mainly, in recent days, the convolutional neural networks (CNN), have powerful descriptors for computer added diagnosis systems. Even so, there are several issues when work with medical images in which many of medical images possess a low-quality noise-to-signal (NSR) ratio compared to scenes obtained with a digital camera, that generally qualified a confusingly low spatial resolution and tends to make the contrast between different tissues of body are very low and it difficult to co

... Show More
View Publication Preview PDF
Scopus (3)
Scopus