Background: Radiologic evaluation of breast lesions is being achieved through several imaging modalities. Mammography has an established role in breast cancer screening and diagnosis. Still however, it shows some limitations particulary in dense breast.
Methods : Magnetic resonance imaging is an attractive tool for the diagnosis of breast tumors1 and the use of magnetic resonance imaging of the breast is rapidly increasing as this technique becomes more widely available.1 As an adjunct to mammography and ultrasound, MRI can be a valuable addition to the work-up of a breast abnormality. MRI has the advantages of providing a three-dimensional view of the breast, performing wit
... Show MoreThe objective of this study was tointroduce a recursive least squares (RLS) parameter estimatorenhanced by using a neural network (NN) to facilitate the computing of a bit error rate (BER) (error reduction) during channels estimation of a multiple input-multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system over a Rayleigh multipath fading channel.Recursive least square is an efficient approach to neural network training:first, the neural network estimator learns to adapt to the channel variations then it estimates the channel frequency response. Simulation results show that the proposed method has better performance compared to the conventional methods least square (LS) and the original RLS and it is more robust a
... Show More
The mechanism of managing religious difference
God is the Lord of the worlds, forget them and their jinn, Arabs and non-Muslims, He is the Lord of Muslims and Lord of non-Muslims, as He created them male and female despite their differences in tongues and colors, so He created them according to their diversity and distinction in beliefs and religions.
To prevent flare-ups due to differences, the Lord of the worlds set limits that he has forbidden to cross, and draw clear maps as mechanisms for managing religious differences and lifting psychological barriers between the different, so that they can coexist in peace and freedom, each adhering to his faith, and practicing the rituals of his religion.
... Show MoreThe aim of the research is to demonstrate the extent of the impact of resource consumption accounting technicality as an administrative technique that is compatible with the rapid developments and changes in the external environment, with the information it provides and scientific foundations in the allocation of indirect costs, and the identification and measurement of idle energy and its costs in a way that contributes to the rationalization of pricing decisions in economic units. In light of the intense competition and the multiplicity of alternatives, and to achieve this goal, a random sample was chosen.
In this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.
The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More