Preferred Language
Articles
/
jkmc-303
A Comparison of Sagittal Sections of Short T1inversion Recovery and T2 Weighted Fast Spin Echo Magnetic Resonance Sequences for Detection of Multiple Sclerosis Spinal Cord Lesions
...Show More Authors

Background: Multiple sclerosis is a chronic autoimmune inflammatory demyelinating disease of the central nervous system of unknown etiology. Different techniques and magnetic resonance image sequences are widely used and compared to each other to improve the detection of multiple sclerosis lesions in the spinal cord. Objective: To evaluate the ability of MRI short tau inversion recovery sequences in improvementof multiple sclerosis spinal cord lesion detection when compared to T2 weighted image sequences. Type of the study: A retrospective study. Methods: this study conducted from 15thAugust 2013 to 30thJune 2014 at Baghdad teaching hospital. 22 clinically definite MS patients with clinical features suggestive of spinal cord involvement, patients were imaged with sagittal short tau inversion recovery sequences and sagittal T2 weighted. Results: The mean age of the patients was 32.5 ± 6.7years; female to male ratio was 2.7:1. The total number of spinal cord MS lesions was 44 of them 86.4% in the cervical spine, 68.2%of the lesions had less than one vertebra extension,79.6% of the lesions did not show changes in the spinal cord morphology. There was a significant upgrading in the lesions conspicuity at short tau inversion recovery sequence comparing to T2 weighted image, P<0.001. A significant difference had been found in artifact grading between both sequences; P<0.001. Conclusions: short tau inversion recovery magnetic resonance image sequences improve detection of MS spinal cord plaques compared with T2 weighted image and itincreasesthe conspicuity of the visualized T2weighted image lesions, but also it accentuates theartifacts more than T2weighted image.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Performance Comparison of Different Advanced Control Schemes for Glucose Level Control under Disturbing Meal
...Show More Authors

Abstract

In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 01 2025
Journal Name
Microbes And Infectious Diseases
Molecular detection and the frequency of a pore-forming toxin in Enterococcus faecalis isolated from urinary tract infections
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Apr 17 2023
Journal Name
Day 2 Tue, April 18, 2023
Development of a Multi-Completion Gas and Downhole Water Sink-Assisted Gravity Drainage (MC-DWS-AGD) to Improve Oil Recovery and Reduce Water Cut in Reservoirs with Strong Water Aquifers
...Show More Authors
Abstract<p>Gas and downhole water sink assisted gravity drainage (GDWS-AGD) is a promising gas-based enhanced oil recovery (EOR) process applicable for reservoirs associated with infinite aquifers. However, it can be costly to implement because it typically involves the drilling of multiple vertical gas-injection wells. The drilling and well-completion costs can be substantially reduced by using additional completions for gas injection in the oil production wells through the annulus positioned at the top of the reservoir. Multi-completion-GDWS-AGD (MC-GDWS-AGD) can be configured to include separate completions for gas injection, oil, and water production in individual wells. This study simulates</p> ... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sat Jul 23 2022
Journal Name
Environmental Monitoring And Assessment
Impact of using magnetic water on the micro structure of leached saline-sodic soil
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
COMPARISON OF SOME NONPARAMETRIC METHODS TO DETERMINE THE NUMBER OF RADIATION DOSES FOR BREAST CANCER PATIENTS
...Show More Authors

Radiation therapy plays an important role in improving breast cancer cases, in order to obtain an appropriateestimate of radiation doses number given to the patient after tumor removal; some methods of nonparametric regression werecompared. The Kernel method was used by Nadaraya-Watson estimator to find the estimation regression function forsmoothing data based on the smoothing parameter h according to the Normal scale method (NSM), Least Squared CrossValidation method (LSCV) and Golden Rate Method (GRM). These methods were compared by simulation for samples ofthree sizes, the method (NSM) proved to be the best according to average of Mean Squares Error criterion and the method(LSCV) proved to be the best according to Average of Mean Absolu

... Show More
Scopus
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Comparison of three interpolation methods for the average monthly temperature in the south of Iraqi zone
...Show More Authors

This study focuses on evaluating the suitability of three interpolation methods in terms of their accuracy at climate data for some provinces of south of Iraq. Two data sets of maximum and minimum temperature in February 2008 from nine meteorological stations located in the south of Iraq using three interpolation methods. ArcGIS is used to produce the spatially distributed temperature data by using IDW, ordinary kriging, and spline. Four statistical methods are applied to analyze the results obtained from three interpolation methods. These methods are RMSE, RMSE as a percentage of the mean, Model efficiency (E) and Bias, which showed that the ordinary krigingis the best for this data from other methods by the results that have b

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 10 2022
Journal Name
European Scholar Journal (esj)
MODELING AND COMPARISON OF CLOSED-LOOP AND OPENLOOP ADAPTIVE OPTICS SYSTEMS
...Show More Authors

Astronomers have known since the invention of the telescope that atmospheric turbulence affects celestial images. So, in order to compensate for the atmospheric aberrations of the observed wavefront, an Adaptive Optics (AO) system has been introduced. The AO can be arranged into two systems: closedloop and open-loop systems. The aim of this paper is to model and compare the performance of both AO loop systems by using one of the most recent Adaptive Optics simulation tools, the Objected-Oriented Matlab Adaptive Optics (OOMAO). Then assess the performance of closed and open loop systems by their capabilities to compensate for wavefront aberrations and improve image quality, also their effect by the observed optical bands (near-infrared band

... Show More
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref