Background: Oral squamous cell carcinoma (OSCC) remains a lethal and deforming disease, with a significant mortality and a rising incidence in younger and female patients. It is thus imperative to identify potential risk factors for OSCC and oral PMDs and to design an accurate data collection tool to try to identify patients at high risk of OSCC development. 14 factors consistently found to be associated with the pathogenesis of OSCC and oral PMDs. Eight of themwere identified as high risk (including tobacco, alcohol, betel quid, marijuana, genetic factors, age, diet and immunodeficiency) and 6 low risk (such as oral health, socioeconomic status, HPV, candida infection, alcoholic mouth wash and diabetes) were stratified according to severit
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreObjective: Evaluation of women's knowledge about risk factors and early detection of breast cancer at
Ibn Rushd college of education in Baghdad University.
Methodology: The study sample included (184) women in the Ibn Rushd College / University of
Baghdad, whose age ranged between (17-58) years. Data were collected through a structured
questionnaire prepared by the National Cancer Research Center which were answered during a scientific
symposium about breast cancer. The score was calculated by correcting the results of the answer, giving
one score for each correct answer and then estimating the level of knowledge and inputting all data in a
statistical program.
Results: The results showed limited level of women's
Detecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.
User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.
In this paper, an Anti-Disturbance Compensator is suggested for the stabilization of a 6-DoF quadrotor Unmanned Aerial vehicle (UAV) system, namely, the Improved Active Disturbance Rejection Control (IADRC). The proposed Control Scheme rejects the disturbances subjected to this system and eliminates the effect of the uncertainties that the quadrotor system exhibits. The complete nonlinear mathematical model of the 6-DoF quadrotor UAV system has been used to design the four ADRCs units for the attitude and altitude stabilization. Stability analysis has been demonstrated for the Linear Extended State Observer (LESO) of each IADRC unit and the overall closed-loop system using Hurwitz stability criterion. A minimization to a
... Show More