首页 > 最新文献

Malaysian Journal of Fundamental and Applied Sciences最新文献

英文 中文
A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application 二维统计矩不变性特征在制定自动概率机器学习识别算法中的比较
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-08-27 DOI: 10.11113/mjfas.v19n4.2917
Z. L. Chuan, David Chong Teak Wei, Connie Lee Wai Yan, Muhammad Fuad Ahmad Nasser, Nor Azura Md. Ghani, A. Jemain, C. Liong
IBIS, ALIS, EVOFINDER, and CONDOR are the massive ballistics computerised technological machines that have typically been utilised in forensic laboratories to automatically locate similarities between images of cartridge cases and bullets. However, it imposed a long execution time and requires physical interpretation to consolidate the analysis results when employing these market-available technologies to accomplish ballistics matching tasks. Therefore, the principal objective of this study is to propose an improvised automated probabilistic machine learning identification algorithm by extracting the two-dimensional (2D) statistical moment invariants from the segmented region of interest (ROI) corresponding to the cartridge case and bullets images. To pursue this principal objective, several 2D statistical moment invariants have been compared and tested to determine the most suitable feature set applied in the proposed identification algorithm. The 2D statistical moment invariants employed include Orthogonal Legendre moments (OLM), Hu moments (HM), Tsirikolias-Mertzois moments (TMM), Pan-Keane moments (PKM), and Central Geometric moments (CGM). Moreover, the proposed identification algorithm is also tested in different scenarios, including based on the classification of strength association measurements between the extracted feature sets. The empirical results in this article revealed that the proposed identification algorithm applied with the CGM comprising the weak association classification yielded the best identification accuracy rates, which are >96.5% across all the sample sizes of the training set. These empirical results also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.
IBIS, ALIS, EVOFINDER和CONDOR是大型弹道计算机化技术机器,通常用于法医实验室自动定位弹壳和子弹图像之间的相似性。然而,当使用这些市场上可用的技术来完成弹道匹配任务时,它强加了很长的执行时间,并且需要物理解释来巩固分析结果。因此,本研究的主要目标是提出一种简易的自动概率机器学习识别算法,该算法通过从对应于弹壳和子弹图像的分割感兴趣区域(ROI)中提取二维(2D)统计矩不变量。为了实现这一主要目标,已经比较和测试了几个二维统计矩不变量,以确定在所提出的识别算法中应用的最合适的特征集。采用的二维统计矩不变量包括正交Legendre矩(OLM)、Hu矩(HM)、Tsirikolias-Mertzois矩(TMM)、Pan-Keane矩(PKM)和中心几何矩(CGM)。此外,所提出的识别算法还在不同的场景下进行了测试,包括基于所提取特征集之间强度关联测量的分类。本文的实证结果表明,基于弱关联分类的CGM识别算法的识别准确率最高,在训练集的所有样本量上均>96.5%。这些实证结果也表明,本研究提出的优越识别算法可以开发为弹道识别的移动应用程序,可以显着减少耗时并方便地执行弹道识别任务。
{"title":"A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application","authors":"Z. L. Chuan, David Chong Teak Wei, Connie Lee Wai Yan, Muhammad Fuad Ahmad Nasser, Nor Azura Md. Ghani, A. Jemain, C. Liong","doi":"10.11113/mjfas.v19n4.2917","DOIUrl":"https://doi.org/10.11113/mjfas.v19n4.2917","url":null,"abstract":"IBIS, ALIS, EVOFINDER, and CONDOR are the massive ballistics computerised technological machines that have typically been utilised in forensic laboratories to automatically locate similarities between images of cartridge cases and bullets. However, it imposed a long execution time and requires physical interpretation to consolidate the analysis results when employing these market-available technologies to accomplish ballistics matching tasks. Therefore, the principal objective of this study is to propose an improvised automated probabilistic machine learning identification algorithm by extracting the two-dimensional (2D) statistical moment invariants from the segmented region of interest (ROI) corresponding to the cartridge case and bullets images. To pursue this principal objective, several 2D statistical moment invariants have been compared and tested to determine the most suitable feature set applied in the proposed identification algorithm. The 2D statistical moment invariants employed include Orthogonal Legendre moments (OLM), Hu moments (HM), Tsirikolias-Mertzois moments (TMM), Pan-Keane moments (PKM), and Central Geometric moments (CGM). Moreover, the proposed identification algorithm is also tested in different scenarios, including based on the classification of strength association measurements between the extracted feature sets. The empirical results in this article revealed that the proposed identification algorithm applied with the CGM comprising the weak association classification yielded the best identification accuracy rates, which are >96.5% across all the sample sizes of the training set. These empirical results also conveyed that the superior proposed identification algorithm in this research could be developed as a mobile application for ballistics identification that can significantly reduce the time taken and conveniently perform the ballistics identification tasks.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"50 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76594142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Performance Analysis of Simple WDM Optical Fiber Communication System 简单WDM光纤通信系统的设计与性能分析
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2990
H. F. Fakhruldeen, Ahlam R. Khekan, Ibrahim H. Al-Kharsan
WDM (wavelength division multiplexing) is used in this project to simultaneously send data over several channels at high speed. Single mode fiber is favored over Multimode fiber for long-distance communication. As data rate and optical fiber length grow, the quality factor falls. Dispersion effects on an 8-channel dense WDM system at a high data rate will be examined using the Optisystem 10 simulator. A dispersion compensation fiber (DCF) and an Erbium doped fiber amplifier (EDFA) are used to compensate for the dispersion and attenuation in the transmitted optical signal, respectively. Bit error rate (BER) and eye diagram analyzers were used to evaluate the optical communication system's performance.
在这个项目中使用WDM(波分复用)在多个通道上高速同时发送数据。在远距离通信中,单模光纤比多模光纤更受青睐。随着数据速率和光纤长度的增加,质量系数下降。在高数据速率下,8通道密集WDM系统的色散效应将使用Optisystem 10模拟器进行研究。色散补偿光纤(DCF)和掺铒光纤放大器(EDFA)分别用于补偿传输光信号中的色散和衰减。采用误码率(BER)和眼图分析仪对光通信系统的性能进行了评价。
{"title":"Design and Performance Analysis of Simple WDM Optical Fiber Communication System","authors":"H. F. Fakhruldeen, Ahlam R. Khekan, Ibrahim H. Al-Kharsan","doi":"10.11113/mjfas.v19n3.2990","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2990","url":null,"abstract":"WDM (wavelength division multiplexing) is used in this project to simultaneously send data over several channels at high speed. Single mode fiber is favored over Multimode fiber for long-distance communication. As data rate and optical fiber length grow, the quality factor falls. Dispersion effects on an 8-channel dense WDM system at a high data rate will be examined using the Optisystem 10 simulator. A dispersion compensation fiber (DCF) and an Erbium doped fiber amplifier (EDFA) are used to compensate for the dispersion and attenuation in the transmitted optical signal, respectively. Bit error rate (BER) and eye diagram analyzers were used to evaluate the optical communication system's performance.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"37 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88652376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Car Number Plate Detection using Morphological Image Processing 基于形态学图像处理的车牌自动检测
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2910
Mustafa Qahtan Alsudani, Safa Riyadh Waheed, K. A. Kadhim, M. M. Adnan, Ameer Al-khaykan
One of the most common uses of computer vision, automatic number plate recognition (ANPR) is also a pretty well-explored subject with numerous effective solutions. Due to regional differences in license plate design, however, these solutions are often optimized for a specific setting. Number plate recognition algorithms are often dependent on these aspects, making a universal solution unlikely due to the fact that the image analysis methods used to develop these algorithms cannot guarantee a perfect success rate. In this research, we offer an algorithm tailor-made for use with brand-new license plates in Iraq. The method employs edge detection, Feature Detection, and mathematical morphology to find the plate; it was developed in C++ using the OpenCV library. When characters were found on the plate, they were entered into the Easy OCR engine for analysis.
自动车牌识别(ANPR)是计算机视觉最常见的用途之一,也是一个探索得很好的主题,有许多有效的解决方案。然而,由于车牌设计的地区差异,这些解决方案通常针对特定设置进行优化。车牌识别算法往往依赖于这些方面,由于用于开发这些算法的图像分析方法不能保证完美的成功率,因此不可能有一个通用的解决方案。在这项研究中,我们提供了一个专门用于伊拉克全新车牌的算法。该方法采用边缘检测、特征检测和数学形态学对板材进行查找;它是使用OpenCV库在c++中开发的。当在印版上发现字符时,它们被输入Easy OCR引擎进行分析。
{"title":"Automatic Car Number Plate Detection using Morphological Image Processing","authors":"Mustafa Qahtan Alsudani, Safa Riyadh Waheed, K. A. Kadhim, M. M. Adnan, Ameer Al-khaykan","doi":"10.11113/mjfas.v19n3.2910","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2910","url":null,"abstract":"One of the most common uses of computer vision, automatic number plate recognition (ANPR) is also a pretty well-explored subject with numerous effective solutions. Due to regional differences in license plate design, however, these solutions are often optimized for a specific setting. Number plate recognition algorithms are often dependent on these aspects, making a universal solution unlikely due to the fact that the image analysis methods used to develop these algorithms cannot guarantee a perfect success rate. In this research, we offer an algorithm tailor-made for use with brand-new license plates in Iraq. The method employs edge detection, Feature Detection, and mathematical morphology to find the plate; it was developed in C++ using the OpenCV library. When characters were found on the plate, they were entered into the Easy OCR engine for analysis.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"112 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85834836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keratinase Production by Bacillus sp. MD24 in Sub-merge and Solid State Fermentation 芽孢杆菌MD24在水下和固体发酵中产生角化酶
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.3028
S. Suharti, Hanif Nur Rozaq, Aulia Qisti, M. Alvionita, S. Wonorahardjo
Chicken feathers are valuable solid waste that mainly contains insoluble proteins called keratin. Naturally, keratin is degraded by microbes that produce a specific protease called keratinase.  Many reports have been addressed to study Bacillus species as keratin-degrading microbes. However, most reported works were using pathogenic soil Bacillus. Our work has been concentrated on keratinase produced by a soil bacterium, Bacillus sp. MD24 and we confirmed it as a non-pathogenic bacterium. This report describes the different profiles of keratinase fermentation between sub-merged fermentation (SmF) and solid-state fermentation (SSF) using chicken feathers as a sole carbon and nitrogen source.  Keratinase production and weight loss were followed for 10 consecutive days, the keratinase molecular weight was investigated, the type and concentration of 18 amino acids were determined using LC-MS/MS after 10 days to seek its potential as the amino acid source, and protein by-product concentration was measured. The results showed that keratinase production as well as weight loss in SmF was better compared to SSF with different optimum production times. Surprisingly, L-arginine was a dominant amino acid in SmF hydrolysate which contained 42.06% of total amino acids and made Bacillus sp. MD24 is a potential organism for L-arginine production. As protein by-product concentration was relatively low in both conditions showing effective utilization of chicken feathers as matter and energy source, consequently, cell-free keratinase should be applied to degrade chicken feathers into valuable materials.
鸡毛是有价值的固体废物,主要含有一种叫做角蛋白的不溶性蛋白质。自然地,角蛋白会被微生物降解,这些微生物会产生一种叫做角蛋白酶的特殊蛋白酶。许多关于芽孢杆菌作为角蛋白降解微生物的研究报道。然而,大多数报道的工作是利用病原土壤芽孢杆菌。我们的工作集中在一种土壤细菌芽孢杆菌sp. MD24产生的角化酶上,我们证实它是一种非致病性细菌。本文介绍了以鸡毛为唯一碳氮源的深层发酵(SmF)和固态发酵(SSF)中角化酶发酵的不同特征。连续10 d观察角化酶的产生和失重情况,测定角化酶的分子量,10 d后用LC-MS/MS测定18种氨基酸的种类和浓度,寻找其作为氨基酸来源的可能性,并测定蛋白质副产物浓度。结果表明,不同最佳生产时间下,SmF的角化酶产量和减重效果均优于SSF。令人惊讶的是,l -精氨酸是SmF水解产物的优势氨基酸,占总氨基酸的42.06%,使芽孢杆菌sp. MD24是一个潜在的l -精氨酸生产菌。由于两种条件下的蛋白质副产物浓度相对较低,显示了鸡毛作为物质和能量来源的有效利用,因此应利用无细胞角化酶将鸡毛降解为有价值的材料。
{"title":"Keratinase Production by Bacillus sp. MD24 in Sub-merge and Solid State Fermentation","authors":"S. Suharti, Hanif Nur Rozaq, Aulia Qisti, M. Alvionita, S. Wonorahardjo","doi":"10.11113/mjfas.v19n3.3028","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.3028","url":null,"abstract":"Chicken feathers are valuable solid waste that mainly contains insoluble proteins called keratin. Naturally, keratin is degraded by microbes that produce a specific protease called keratinase.  Many reports have been addressed to study Bacillus species as keratin-degrading microbes. However, most reported works were using pathogenic soil Bacillus. Our work has been concentrated on keratinase produced by a soil bacterium, Bacillus sp. MD24 and we confirmed it as a non-pathogenic bacterium. This report describes the different profiles of keratinase fermentation between sub-merged fermentation (SmF) and solid-state fermentation (SSF) using chicken feathers as a sole carbon and nitrogen source.  Keratinase production and weight loss were followed for 10 consecutive days, the keratinase molecular weight was investigated, the type and concentration of 18 amino acids were determined using LC-MS/MS after 10 days to seek its potential as the amino acid source, and protein by-product concentration was measured. The results showed that keratinase production as well as weight loss in SmF was better compared to SSF with different optimum production times. Surprisingly, L-arginine was a dominant amino acid in SmF hydrolysate which contained 42.06% of total amino acids and made Bacillus sp. MD24 is a potential organism for L-arginine production. As protein by-product concentration was relatively low in both conditions showing effective utilization of chicken feathers as matter and energy source, consequently, cell-free keratinase should be applied to degrade chicken feathers into valuable materials.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"7 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83822252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Random Color Image Encryption Using the Genetic Algorithm 基于遗传算法的随机彩色图像加密
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2907
Hanan Abbas Salman, Duha Amer Mahdi
This paper implements a combined pseudo-random sequence generator based on neural networks and chaotic, random variable color images based on an algorithm for chaotic encryption, secure image storage, and transmission. The generator that controls the operation of the encryption algorithm: the arrangement of pixel positions, the use of random color images of the AES algorithm to achieve encryption, creation algorithms, and neural networks by dynamically updating control parameters and numbers to increase the generated chaotic sequence randomness by using simulation MATLAB for getting output. The chaotic function's iteration of the neural networks. The experimental results are presented in the form of a pixel correlation coefficient and security analysis to prove the security and effectiveness of the proposed chaos-based ANN encryption.
本文基于混沌加密、图像安全存储和传输算法,实现了一种基于神经网络和混沌随机变色图像的组合伪随机序列发生器。控制加密算法运行的生成器:排列像素位置,利用AES算法中的随机彩色图像实现加密,创建算法,通过动态更新控制参数和个数来增加神经网络生成的混沌序列的随机性,利用仿真MATLAB获得输出。神经网络混沌函数的迭代。实验结果以像素相关系数和安全性分析的形式给出,证明了所提出的基于混沌的人工神经网络加密的安全性和有效性。
{"title":"Random Color Image Encryption Using the Genetic Algorithm","authors":"Hanan Abbas Salman, Duha Amer Mahdi","doi":"10.11113/mjfas.v19n3.2907","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2907","url":null,"abstract":"This paper implements a combined pseudo-random sequence generator based on neural networks and chaotic, random variable color images based on an algorithm for chaotic encryption, secure image storage, and transmission. The generator that controls the operation of the encryption algorithm: the arrangement of pixel positions, the use of random color images of the AES algorithm to achieve encryption, creation algorithms, and neural networks by dynamically updating control parameters and numbers to increase the generated chaotic sequence randomness by using simulation MATLAB for getting output. The chaotic function's iteration of the neural networks. The experimental results are presented in the form of a pixel correlation coefficient and security analysis to prove the security and effectiveness of the proposed chaos-based ANN encryption.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"59 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75153877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models and Methods of Information and Control System Cyber–security for Smart Buildings 智能建筑信息与控制系统网络安全模型与方法
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2902
H. F. Fakhruldeen, Karrar A. Kadhim, Tahreer Abdulridha Shyaa, Heba Abdul-Jaleel Al-Asady
Smart building management systems today employ the architectural multi-level creation of a system of unified components. Such a market is dynamic and always expanding, and sometimes the developers of such components stop maintaining their products or even collapse and vanish. It's not always possible to use professional-level components from proven developers when a building automation system (BAS) project budget is limited. The construction and analysis of models that consider the dependability and cyber security aspects of maintenance as well as ways of validating the selection of components, strategies, and service parameters are both necessary steps in finding compromises between the BAS architecture's value and quality. Use of information technology to determine maintenance parameters based on a model and model development approach.
如今的智能楼宇管理系统采用了建筑多层次的统一组件创建系统。这样的市场是动态的,不断扩大的,有时这些组件的开发者停止维护他们的产品,甚至崩溃并消失。当建筑自动化系统(BAS)项目预算有限时,使用经过验证的开发人员的专业级组件并不总是可能的。考虑维护的可靠性和网络安全方面的模型的构建和分析,以及验证组件、策略和服务参数选择的方法,都是在BAS体系结构的价值和质量之间找到折衷的必要步骤。利用信息技术根据模型和模型开发方法确定维护参数。
{"title":"Models and Methods of Information and Control System Cyber–security for Smart Buildings","authors":"H. F. Fakhruldeen, Karrar A. Kadhim, Tahreer Abdulridha Shyaa, Heba Abdul-Jaleel Al-Asady","doi":"10.11113/mjfas.v19n3.2902","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2902","url":null,"abstract":"Smart building management systems today employ the architectural multi-level creation of a system of unified components. Such a market is dynamic and always expanding, and sometimes the developers of such components stop maintaining their products or even collapse and vanish. It's not always possible to use professional-level components from proven developers when a building automation system (BAS) project budget is limited. The construction and analysis of models that consider the dependability and cyber security aspects of maintenance as well as ways of validating the selection of components, strategies, and service parameters are both necessary steps in finding compromises between the BAS architecture's value and quality. Use of information technology to determine maintenance parameters based on a model and model development approach.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"46 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75584602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early Diagnosis of Alzheimer's Disease using Convolutional Neural Network-based MRI 基于卷积神经网络的MRI早期诊断阿尔茨海默病
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2908
K. A. Kadhim, Farhan Mohamed, Ammar AbdRaba Sakran, M. M. Adnan, G. A. Salman
Alzheimer's disease (AD) is a neurodegenerative ailment that causes cognitive deterioration due to changes in brain structure. Individuals usually see diagnostic symptoms after irreversible brain damage has occurred. In order to slow the course of the illness and enhance the quality of life for AD patients, early diagnosis is crucial. Recent advances in machine learning and scanning have made the use of these methods to detect AD in its earliest stages possible. This article uses deep learning using CNN methods to extract picture characteristics from ADNI (Alzheimer's Disease Neuroimaging Initiative) datasets to improve Alzheimer's disease diagnosis techniques. This descriptor will be used in conjunction with the CNN to categorize the illness and add new characteristics that are more accurate, quicker, and stable than the current features. In this process, an Alzheimer's detection System will be implemented to mitigate the adverse effects of data imbalance on recognition performance, and an integrated multi-depth architectural technology will be introduced to boost recognition quality. Using the suggested model of the convolution neural network (CNN) technique, classification accuracy results were obtained above 97%.
阿尔茨海默病(AD)是一种神经退行性疾病,由于大脑结构的改变导致认知能力下降。个体通常在发生不可逆转的脑损伤后才会出现诊断症状。为了减缓病程,提高阿尔茨海默病患者的生活质量,早期诊断至关重要。机器学习和扫描的最新进展使这些方法能够在AD的早期阶段检测到AD。本文利用CNN方法利用深度学习从ADNI (Alzheimer's Disease Neuroimaging Initiative)数据集中提取图像特征,以提高Alzheimer's Disease的诊断技术。该描述符将与CNN一起用于对疾病进行分类,并添加比当前特征更准确、更快速、更稳定的新特征。在此过程中,将实现阿尔茨海默病检测系统,以减轻数据不平衡对识别性能的不利影响,并引入集成的多深度架构技术来提高识别质量。采用卷积神经网络(CNN)技术提出的模型,分类准确率达到97%以上。
{"title":"Early Diagnosis of Alzheimer's Disease using Convolutional Neural Network-based MRI","authors":"K. A. Kadhim, Farhan Mohamed, Ammar AbdRaba Sakran, M. M. Adnan, G. A. Salman","doi":"10.11113/mjfas.v19n3.2908","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2908","url":null,"abstract":"Alzheimer's disease (AD) is a neurodegenerative ailment that causes cognitive deterioration due to changes in brain structure. Individuals usually see diagnostic symptoms after irreversible brain damage has occurred. In order to slow the course of the illness and enhance the quality of life for AD patients, early diagnosis is crucial. Recent advances in machine learning and scanning have made the use of these methods to detect AD in its earliest stages possible. This article uses deep learning using CNN methods to extract picture characteristics from ADNI (Alzheimer's Disease Neuroimaging Initiative) datasets to improve Alzheimer's disease diagnosis techniques. This descriptor will be used in conjunction with the CNN to categorize the illness and add new characteristics that are more accurate, quicker, and stable than the current features. In this process, an Alzheimer's detection System will be implemented to mitigate the adverse effects of data imbalance on recognition performance, and an integrated multi-depth architectural technology will be introduced to boost recognition quality. Using the suggested model of the convolution neural network (CNN) technique, classification accuracy results were obtained above 97%.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"14 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81785253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-quantum Techniques in Wireless Network Security: An Overview 无线网络安全中的后量子技术综述
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2905
H. F. Fakhruldeen, Rana Abbas Al-Kaabi, Feryal Ibrahim Jabbar, Ibrahim H. Al-Kharsan, Sarah Jawad Shoja
Post quantum is a general name to all the techniques which are safe against the quantum computer attack. The wireless network is one of the most important means of communication. Wireless network security is a top priority. Wireless networks use conventional cryptography, which has various flaws, whereas quantum cryptography claims to be completely secure. It wasn't long after quantum computers became operational that people began to think about new ways to secure electronic communications. After considering all of the weaknesses in conventional cryptosystems, individuals began to look for new ways to secure electronic communications. Traditional cryptography has many problems, but quantum cryptography addresses nearly all of them.
后量子技术是所有能够安全抵御量子计算机攻击的技术的总称。无线网络是最重要的通信手段之一。无线网络安全是重中之重。无线网络使用传统的加密技术,这种技术有各种缺陷,而量子加密技术声称是完全安全的。量子计算机投入使用后不久,人们就开始思考保护电子通信安全的新方法。在考虑了传统密码系统的所有弱点之后,个人开始寻找新的方法来保护电子通信。传统密码学存在许多问题,而量子密码学几乎解决了所有问题。
{"title":"Post-quantum Techniques in Wireless Network Security: An Overview","authors":"H. F. Fakhruldeen, Rana Abbas Al-Kaabi, Feryal Ibrahim Jabbar, Ibrahim H. Al-Kharsan, Sarah Jawad Shoja","doi":"10.11113/mjfas.v19n3.2905","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2905","url":null,"abstract":"Post quantum is a general name to all the techniques which are safe against the quantum computer attack. The wireless network is one of the most important means of communication. Wireless network security is a top priority. Wireless networks use conventional cryptography, which has various flaws, whereas quantum cryptography claims to be completely secure. It wasn't long after quantum computers became operational that people began to think about new ways to secure electronic communications. After considering all of the weaknesses in conventional cryptosystems, individuals began to look for new ways to secure electronic communications. Traditional cryptography has many problems, but quantum cryptography addresses nearly all of them.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"15 12 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86937349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plasma in Dentistry 牙科中的等离子体
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2904
Riyam Adnan Hammudi, Yamam A. Hammudi, A. A. Salim, Zeid Alsadoon, R. S. Radh, I. M. Abbas, Aboo-Thar Ali Hammad
Plasma technologies are mostly used in dentistry; our work focuses on Plasma scopes and plasma applications in dentistry. We will directly deliberate about liquid, solid, and gas only without sophisticated about the fourth state (Plasma), which is the most abundant and the most important state and is considered the new technology in dentistry that may create a revolution in this field as a painless free technology in all dental fields. The study results showed that cold atmospheric Plasma could be a new and painless method before the preparation of the cavities. Also, it is very effective in bacterial inactivation, sterilization, oral diseases, root canal treatment, and disordered tissues; therefore, Plasma is used mostly for treating tooth diseases and tooth whitening.
等离子体技术主要用于牙科;我们的工作重点是等离子示波器和等离子体在牙科中的应用。我们将直接讨论液体、固体和气体,而不涉及第四种状态(等离子体),这是最丰富和最重要的状态,被认为是牙科领域的新技术,可能会在牙科领域引发一场革命,因为它是牙科所有领域的无痛技术。研究结果表明,低温大气等离子体是一种新的无痛制备空腔的方法。在细菌灭活、杀菌、口腔疾病、根管治疗、组织紊乱等方面也非常有效;因此,血浆主要用于治疗牙齿疾病和牙齿美白。
{"title":"Plasma in Dentistry","authors":"Riyam Adnan Hammudi, Yamam A. Hammudi, A. A. Salim, Zeid Alsadoon, R. S. Radh, I. M. Abbas, Aboo-Thar Ali Hammad","doi":"10.11113/mjfas.v19n3.2904","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2904","url":null,"abstract":"Plasma technologies are mostly used in dentistry; our work focuses on Plasma scopes and plasma applications in dentistry. We will directly deliberate about liquid, solid, and gas only without sophisticated about the fourth state (Plasma), which is the most abundant and the most important state and is considered the new technology in dentistry that may create a revolution in this field as a painless free technology in all dental fields. The study results showed that cold atmospheric Plasma could be a new and painless method before the preparation of the cavities. Also, it is very effective in bacterial inactivation, sterilization, oral diseases, root canal treatment, and disordered tissues; therefore, Plasma is used mostly for treating tooth diseases and tooth whitening.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"3 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82852086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One Time Password based Mutual Text Authentication 基于一次性密码的文本互鉴
IF 0.6 Q3 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-05-26 DOI: 10.11113/mjfas.v19n3.2994
Salah H Abbdal Refish
Many applications in the internet using Password for identify users.  So, this password must be strong and safe to avoid unauthorized users. The critical issue in many applications such as web-sites and data base systems is password authentication code (PAC). In this paper, PAC between two parties to confirm password authentication between them based mutual text authentication has presented. Two factors is the best solution in this field. But to be more secure and to be more efficient a legitimate user needs to make sure about his partner to ensure their communications should use another method without need more costs and avoid plurality of algorithms.  So, this solution uses mutual text authentication as new solution which the text is predetermined by users. This method is considered new in this field, as this method tries to make the password highly secure in front of unauthorized users and to make the process of accessing information specific only to the actual authorized users. When analysing this method, we find that it has many characteristics such as the confidentiality of the session key and privacy, in addition to the exchange of authentication between the two parties to ensure that others do not interfere.
互联网上的许多应用程序都使用密码来识别用户。因此,这个密码必须是强大和安全的,以避免未经授权的用户。在许多应用程序(如网站和数据库系统)中,关键问题是密码验证码(PAC)。本文提出了一种基于双方互文本认证的PAC口令验证方法。两个因素是这个领域的最佳解决方案。但为了更安全、更高效,合法用户需要确保他的伴侣,确保他们的通信应该使用另一种不需要更多成本的方法,避免使用多种算法。因此,该方案采用用户预先确定文本的互文本认证作为新方案。这种方法在该领域被认为是一种新方法,因为这种方法试图在未经授权的用户面前使密码高度安全,并使访问信息的过程仅针对实际授权的用户。在对该方法进行分析时,我们发现它具有会话密钥的保密性和私密性等诸多特点,此外双方之间还可以交换身份验证,以确保他人不受干扰。
{"title":"One Time Password based Mutual Text Authentication","authors":"Salah H Abbdal Refish","doi":"10.11113/mjfas.v19n3.2994","DOIUrl":"https://doi.org/10.11113/mjfas.v19n3.2994","url":null,"abstract":"Many applications in the internet using Password for identify users.  So, this password must be strong and safe to avoid unauthorized users. The critical issue in many applications such as web-sites and data base systems is password authentication code (PAC). In this paper, PAC between two parties to confirm password authentication between them based mutual text authentication has presented. Two factors is the best solution in this field. But to be more secure and to be more efficient a legitimate user needs to make sure about his partner to ensure their communications should use another method without need more costs and avoid plurality of algorithms.  So, this solution uses mutual text authentication as new solution which the text is predetermined by users. This method is considered new in this field, as this method tries to make the password highly secure in front of unauthorized users and to make the process of accessing information specific only to the actual authorized users. When analysing this method, we find that it has many characteristics such as the confidentiality of the session key and privacy, in addition to the exchange of authentication between the two parties to ensure that others do not interfere.","PeriodicalId":18149,"journal":{"name":"Malaysian Journal of Fundamental and Applied Sciences","volume":"99 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81091322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Malaysian Journal of Fundamental and Applied Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1