Preferred Language
Articles
/
lRfgPo8BVTCNdQwCGGXF
MR Images Classification of Alzheimer's Disease Based on Deep Belief Network Method
...Show More Authors

Background/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the use of Gray Level Co-occurrence Matrix (GLCM) features and DBN classifier provides 98.26% accuracy with the two specific classes were tested. Improvements/Applications: AD is a neurological condition affecting the brain and causing dementia that may affect the mind and memory. The disease indirectly impacts more than 15 million relatives, companions and guardians. The results of the present research are expected to help the specialist in decision making process.

Publication Date
Fri Feb 28 2025
Journal Name
Bmc Psychology
Delving into the Elements Impacting Treatment Acceptance among patients with Substance Use Disorder using Health Belief Model: a qualitative study
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (19)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation
classification coco dataset using machine learning algorithms
...Show More Authors

In this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho

... Show More
Publication Date
Sun Jun 15 2025
Journal Name
Iraqi Journal Of Laser
Performance Enhancement of Metasurface Grating Polarizer Using Deep Learning for Quantum Key Distribution Systems
...Show More Authors

Metasurface polarizers are essential optical components in modern integrated optics and play a vital role in many optical applications including Quantum Key Distribution systems in quantum cryptography. However, inverse design of metasurface polarizers with high efficiency depends on the proper prediction of structural dimensions based on required optical response. Deep learning neural networks can efficiently help in the inverse design process, minimizing both time and simulation resources requirements, while better results can be achieved compared to traditional optimization methods. Hereby, utilizing the COMSOL Multiphysics Surrogate model and deep neural networks to design a metasurface grating structure with high extinction rat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Mon Feb 22 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
MRI images series segmentation using the geodesic deformable model
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 13 2021
Journal Name
International Journal Of Pharmacy Practice
A comprehensive review of drivers influencing flu vaccine acceptance in the Middle East over the last six years: using Health Belief Model
...Show More Authors
Abstract<sec> <title>Objectives

The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).

Methods

A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio

... Show More
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Nov 13 2021
Journal Name
International Journal Of Pharmacy Practice
A comprehensive review of drivers influencing flu vaccine acceptance in the Middle East over the last six years: using Health Belief Model
...Show More Authors
Abstract<sec> <title>Objectives

The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).

Methods

A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF