The Silver1Indium1Selenide (AgInSe2) (AIS) thin1films of (3001±20) nm thickness have been1prepared2from the compound alloys2using thermal evaporation2 technique onto the glass2substrate at room temperature, with a deposition rate2(3±0.1) nm2sec-1. The2structural, optical and electrical3properties have been studied3at different annealing3temperatures (Ta=450, 550 and 650) K. The amount3or (concentration) of the elements3(Ag, In, Se) in the prepared alloy3was verified using an energy dispersive3x-ray spectrometer (EDS)3technology. X-ray diffraction3analysis shows that AIS alloy prepared as (powder) and the thin films3are polycrystalline of tetragonal3structure with preferential orientation3(112). The crystalline3size increases as a function3of annealing temperature. The atomic force3microscope (AFM) technique was used to examine3the topography and estimate3the surface roughness, also the average grain3size of the films. The results show3that the grain size increases3with annealing3temperature. The optical4band gap of the films lies4in the range 1.6-1.9 eV. The films4appear to be4n-type indicating that the electrons4as a dominant charge4carrier. The electrical conductivity4increases with a corresponding4increase in annealing4temperature.
{"title":"Investigation of the Structural, Optical and Electrical Properties of AgInSe2 Thin Films","authors":"I. Khudayer, B. Ali, M. H. Mustafa, A. J. Ibrahim","doi":"10.30526/31.1.1848","DOIUrl":"https://doi.org/10.30526/31.1.1848","url":null,"abstract":"The Silver1Indium1Selenide (AgInSe2) (AIS) thin1films of (3001±20) nm thickness have been1prepared2from the compound alloys2using thermal evaporation2 technique onto the glass2substrate at room temperature, with a deposition rate2(3±0.1) nm2sec-1. \u0000The2structural, optical and electrical3properties have been studied3at different annealing3temperatures (Ta=450, 550 and 650) K. \u0000The amount3or (concentration) of the elements3(Ag, In, Se) in the prepared alloy3was verified using an energy dispersive3x-ray spectrometer (EDS)3technology. X-ray diffraction3analysis shows that AIS alloy prepared as (powder) and the thin films3are polycrystalline of tetragonal3structure with preferential orientation3(112). The crystalline3size increases as a function3of annealing temperature. The atomic force3microscope (AFM) technique was used to examine3the topography and estimate3the surface roughness, also the average grain3size of the films. The results show3that the grain size increases3with annealing3temperature. \u0000 The optical4band gap of the films lies4in the range 1.6-1.9 eV. The films4appear to be4n-type indicating that the electrons4as a dominant charge4carrier. The electrical conductivity4increases with a corresponding4increase in annealing4temperature.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"8 1","pages":"37-49"},"PeriodicalIF":0.0,"publicationDate":"2018-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88890224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Three monogeneans: Dactylogyrus folkmanovae from gills of Chondrostoma regium, D. reinii from gills of Mesopotamichthys sharpeyi and D. robustus from gills of Leuciscus vorax were collected from Diyala River in Diyala Province. The description, measurements and illustrations of these parasites were given.
{"title":"First Occurrence of Three Species of the Genus Dactylogyrus Diesing , 1850 (Monogenea: Dactylogyridae) in Iraq from Some Diyala River Fishes , Diyala Province","authors":"A. Al-Saadi, Haider J. Mohammed","doi":"10.30526/31.1.1843","DOIUrl":"https://doi.org/10.30526/31.1.1843","url":null,"abstract":"Three monogeneans: Dactylogyrus folkmanovae from gills of Chondrostoma regium, D. reinii from gills of Mesopotamichthys sharpeyi and D. robustus from gills of Leuciscus vorax were collected from Diyala River in Diyala Province. The description, measurements and illustrations of these parasites were given.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"5 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83162350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Objective: The present study investigated the effects of different dose levels of Zinc oxide Nanoparticles (ZnO NPs) on the liver and kidney tissues in albino male mice. Methadology: ZnO NPs was administrated as a daily oral dose of (150, 350 mg/kg body weight) gavage for 2 weeks. Eighteen male mices were used by dividing them into three groups. Result: Histopathological examination of kidney and hepatic tissues treated with ZnO NPs showed toxicity changes compared with control group. Conclusion:This study demonstrated the ability of ZnO NPs to affect on kidney and liver tissues. Recommendation: More study needed to know the effect of different doses of nanoparticles on human health.
{"title":"Histopathological Effect of Zinc Oxide Nanoparticles on Kkidney and Liver Tissues in Albino Male Mice","authors":"R. Salman","doi":"10.30526/31.1.1844","DOIUrl":"https://doi.org/10.30526/31.1.1844","url":null,"abstract":"Objective: The present study investigated the effects of different dose levels of Zinc oxide Nanoparticles (ZnO NPs) on the liver and kidney tissues in albino male mice. Methadology: ZnO NPs was administrated as a daily oral dose of (150, 350 mg/kg body weight) gavage for 2 weeks. Eighteen male mices were used by dividing them into three groups. Result: Histopathological examination of kidney and hepatic tissues treated with ZnO NPs showed toxicity changes compared with control group. Conclusion:This study demonstrated the ability of ZnO NPs to affect on kidney and liver tissues. Recommendation: More study needed to know the effect of different doses of nanoparticles on human health.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"42 1","pages":"9-14"},"PeriodicalIF":0.0,"publicationDate":"2018-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73355669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the presence of multi-collinearity problem, the parameter estimation method based on the ordinary least squares procedure is unsatisfactory. In 1970, Hoerl and Kennard insert analternative method labeled as estimator of ridge regression. In such estimator, ridge parameter plays an important role in estimation. Various methods were proposed by many statisticians to select the biasing constant (ridge parameter). Another popular method that is used to deal with the multi-collinearity problem is the principal component method. In this paper,we employ the simulation technique to compare the performance of principal component estimator with some types of ordinary ridge regression estimators based on the value of the biasing constant (ridge parameter). The mean square error (MSE) is used as a criterion to assess the performance of such estimators.
{"title":"The Comparison Between Different Approaches to Overcome the Multicollinearity Problem in Linear Regression Models","authors":"H. Gorgees, F. Mahdi","doi":"10.30526/31.1.1841","DOIUrl":"https://doi.org/10.30526/31.1.1841","url":null,"abstract":"In the presence of multi-collinearity problem, the parameter estimation method based on the ordinary least squares procedure is unsatisfactory. In 1970, Hoerl and Kennard insert analternative method labeled as estimator of ridge regression. \u0000In such estimator, ridge parameter plays an important role in estimation. Various methods were proposed by many statisticians to select the biasing constant (ridge parameter). Another popular method that is used to deal with the multi-collinearity problem is the principal component method. In this paper,we employ the simulation technique to compare the performance of principal component estimator with some types of ordinary ridge regression estimators based on the value of the biasing constant (ridge parameter). The mean square error (MSE) is used as a criterion to assess the performance of such estimators.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"92 1 1","pages":"212-221"},"PeriodicalIF":0.0,"publicationDate":"2018-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89447306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current study was designed to investigate the occurrence of aflatoxin B1 in thirty two samples of fish feedstuff were collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin B1 was detected in thirty samples and the concentration of toxin ranged from 50 ppb to 1000 ppb. Microwave and ozone were used for detoxification of aflatoxin B1 from sample with highest concentration (1000 ppb), two degree of temperature and two times (50°C and 100°C for 5 minute and 10 minute to each degree) of microwave, also two doses and two times (2 g and 4 g for 5 minute and 10 minute to each dose) of ozone gas were used. Degradation of aflatoxin B1 by microwave has been found to cause a significant (P ≤ 0.05) decrease of aflatoxin B1, Moreover, the concentration of aflatoxin B1 was dependent on temperature degrees and exposure time, also sample subjected to ozone gas caused a significant (P ≤ 0.05) decrease in aflatoxin B1 contents and the concentration of aflatoxin B1 was dependent on doses and times of exposure. Results showed that ozone gas was more effective in aflatoxin B1 reduction when compared with microwave.
{"title":"Detection and Detoxification of Aflatoxin B1 from Fish Feedstuff Using Microwave and Ozone Gas","authors":"F. Hassan, H. Z. Hussein, S. N. Hawar","doi":"10.30526/31.1.1847","DOIUrl":"https://doi.org/10.30526/31.1.1847","url":null,"abstract":"The current study was designed to investigate the occurrence of aflatoxin B1 in thirty two samples of fish feedstuff were collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin B1 was detected in thirty samples and the concentration of toxin ranged from 50 ppb to 1000 ppb. \u0000 Microwave and ozone were used for detoxification of aflatoxin B1 from sample with highest concentration (1000 ppb), two degree of temperature and two times (50°C and 100°C for 5 minute and 10 minute to each degree) of microwave, also two doses and two times (2 g and 4 g for 5 minute and 10 minute to each dose) of ozone gas were used. \u0000 Degradation of aflatoxin B1 by microwave has been found to cause a significant (P ≤ 0.05) decrease of aflatoxin B1, Moreover, the concentration of aflatoxin B1 was dependent on temperature degrees and exposure time, also sample subjected to ozone gas caused a significant (P ≤ 0.05) decrease in aflatoxin B1 contents and the concentration of aflatoxin B1 was dependent on doses and times of exposure. Results showed that ozone gas was more effective in aflatoxin B1 reduction when compared with microwave.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"156 1","pages":"28-36"},"PeriodicalIF":0.0,"publicationDate":"2018-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77845254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data. The digital map is separated into the isolated parts.Watermark data are embedded within the nominated magnitudes in each part when satisfied the definite criteria. The efficiency of proposed watermarking scheme is assessed within statistical measures based on two factors which are fidelity and robustness. Experimental results demonstrate the proposed watermarking scheme representing ideal trade off for disagreement issue between distortion amount and robustness. Also, the proposed scheme shows robust resistance for many kinds of attacks.
{"title":"Robust Watermarking Scheme for GIS Vector Maps","authors":"M. Gaata","doi":"10.30526/31.1.1835","DOIUrl":"https://doi.org/10.30526/31.1.1835","url":null,"abstract":"With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data. The digital map is separated into the isolated parts.Watermark data are embedded within the nominated magnitudes in each part when satisfied the definite criteria. The efficiency of proposed watermarking scheme is assessed within statistical measures based on two factors which are fidelity and robustness. Experimental results demonstrate the proposed watermarking scheme representing ideal trade off for disagreement issue between distortion amount and robustness. Also, the proposed scheme shows robust resistance for many kinds of attacks.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"62 1","pages":"277-284"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87191016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.
{"title":"New Steganography System Based on Huffman Coding and Fibonacci Decomposition","authors":"Fadheela Sabri Abu-Almash","doi":"10.30526/31.1.1831","DOIUrl":"https://doi.org/10.30526/31.1.1831","url":null,"abstract":"Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"39 1","pages":"231-243"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77766156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10
电子医疗保健系统是一项伟大的技术改进,通过使用医疗设备,通过佩戴或植入患者体内的传感器。无线体域网络(WBAN)提供了惊人的帮助,它通过使用约定的距离无线传输患者数据,通过定期向接收器传输重要数据指示,始终控制患者的状态。就无线宽带网络和生物传感器发送的数据而言,安全和隐私是一个主要问题。为了找到最优解,通过许多假设提出了几种算法。本文提出了一种利用超混沌周系统的加密算法,该算法在长密钥空间方面提供了高安全性、保密性、高效性和高容量,保证了对任何威胁攻击可能获得的高抵抗力,密钥敏感性太高,加密密钥的任何微小变化都可以进行,最后具有良好的统计特性分析,使用的软件是microsoft visual studio version 10
{"title":"Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System","authors":"H. Hasan","doi":"10.30526/31.1.1833","DOIUrl":"https://doi.org/10.30526/31.1.1833","url":null,"abstract":"E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"61 1","pages":"260-267"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78680158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nada M. Al-Hakkak, Ban Salman Shukur, Atheel Sabih Shaker
The concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related to public cloud computing.
{"title":"E-Government Public Cloud Model (EGPCM)","authors":"Nada M. Al-Hakkak, Ban Salman Shukur, Atheel Sabih Shaker","doi":"10.30526/31.1.1832","DOIUrl":"https://doi.org/10.30526/31.1.1832","url":null,"abstract":"The concept of implementing e-government systems is growing widely all around the world and becoming an interest to all governments. However, governments are still seeking for effective ways to implement e-government systems properly and successfully. As services of e-government increased and citizens’ demands expand, the e-government systems become more costly to satisfy the growing needs. The cloud computing is a technique that has been discussed lately as a solution to overcome some problems that an e-government implementation or expansion is going through. This paper is a proposal of a new model for e-government on basis of cloud computing. E-Government Public Cloud Model EGPCM, for e-government is related to public cloud computing.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"66 1","pages":"244-259"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80996787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead of backpropagation as training algorithm for artificial neural network (ANN). Some other recent training-based Neural Networks, SVM, and KNN classifiers are used for comparison with the proposed classifier. The classifiers are utilized to classify image as normal or abnormal MRI human brain image. The results show that the proposed classifier is outperformed the other competing classifiers.
{"title":"An Improvement of MRI Brain Images Classification Using Dragonfly Algorithm as Trainer of Artificial Neural Network","authors":"A. Abdulameer","doi":"10.30526/31.1.1834","DOIUrl":"https://doi.org/10.30526/31.1.1834","url":null,"abstract":"Computer software is frequently used for medical decision support systems in different areas. Magnetic Resonance Images (MRI) are widely used images for brain classification issue. This paper presents an improved method for brain classification of MRI images. The proposed method contains three phases, which are, feature extraction, dimensionality reduction, and an improved classification technique. In the first phase, the features of MRI images are obtained by discrete wavelet transform (DWT). In the second phase, the features of MRI images have been reduced, using principal component analysis (PCA). In the last (third) stage, an improved classifier is developed. In the proposed classifier, Dragonfly algorithm is used instead of backpropagation as training algorithm for artificial neural network (ANN). Some other recent training-based Neural Networks, SVM, and KNN classifiers are used for comparison with the proposed classifier. The classifiers are utilized to classify image as normal or abnormal MRI human brain image. The results show that the proposed classifier is outperformed the other competing classifiers.","PeriodicalId":13236,"journal":{"name":"Ibn Al-Haitham Journal For Pure And Applied Science","volume":"41 1","pages":"268-276"},"PeriodicalIF":0.0,"publicationDate":"2018-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76356849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}