The development of better tools for diagnosis and more accurate prognosis of cancer includes the search for biomarkers; molecules whose presence, absence or change in quantity or structure is associated with a particular tumour or prognosis/therapeutic outcome. While biomarkers need not be functionally relevant, if cell survival, then they could also provide new targets for therapeutic drugs. In recent years attention has been applied to a group of proteins known as cancer testis antigens (CT antigens) [1]. These proteins are products of genes whose expression was normally confined to the testis, yet they are expressed in tumour cells. CT genes are bound to serve a wide array of roles in the testes, which have many highly differentiated cell types and, uniquely, the specialised role of bearing a germline with cells passing through meiosis....
The paper uses the Direct Synthesis (DS) method for tuning the Proportional Integral Derivative (PID) controller for controlling the DC servo motor. Two algorithms are presented for enhancing the performance of the suggested PID controller. These algorithms are Back-Propagation Neural Network and Particle Swarm Optimization (PSO). The performance and characteristics of DC servo motor are explained. The simulation results that obtained by using Matlab program show that the steady state error is eliminated with shorter adjusted time when using these algorithms with PID controller. A comparative between the two algorithms are described in this paper to show their effectiveness, which is found that the PSO algorithm gives be
... Show MoreThe research stems from its goal of identifying the impact of visual management on the strategic acceleration of business organizations and the state of this effect through the knowledge embedding in the Iraqi oil companies. The oil sector was tested, represented by (3) oil companies, and a sample of (151) individuals who participated in activating the visual management, distributed in higher management levels. The research relied on the descriptiveanalytical approach and the questionnaire was a main tool for collecting data and information. The results showed that visual management positively affects strategic acceleration. Moreover, This effect is amplified by the mediating role played by Embedding Knowledge.
The aim of the research is to design a test with cognitive achievement through the use of the inverted class strategy for some basic soccer skills for gyms for first-average students, within the curriculum of the Ministry of Education, where the researcher used the experimental approach. For the same division (B) and the number of each group (10) students, i.e. the total total of the research sample (20) students, and the pre-test for the research sample was applied through the design of the test prepared by the research after which the educational program with the strategy was applied to the research sample and continued (8) weeks after Completion of the tutorial has been post-tested for the research sample, In it, he reached significant r
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing artificial TABU algorithm to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as sport, chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement.
The article considers metaphors as one of the fundamental means used by L. Ulitskaya when writing the family chronicle "Medea and her Children" (1996), for the formation of images of heroines - representatives of the pronounced feminine principle in the work. Here I describe the results of the next stage of research related to the work of Lyudmila Evgenievna Ulitskaya as a representative of modern Russian prose.
This research aims to the possibility of evaluating the strategic performance of the State Board for Antiquities and Heritage (SBAH) using a balanced scorecard of four criteria (Financial, Customers, Internal Processes, and Learning and Growth). The main challenge was that the State Board use traditional evaluation in measuring employee performance, activities, and projects. Case study and field interviews methodology has been adopted in this research with a sample consisting of the Chairman of the State Board, 6 General Managers, and 7 Department Managers who are involved in evaluating the strategic performance and deciding the suitable answers on the checklists to analyze it ac
... Show MoreA series of tests were conducted to determine the susceptibility of eggs and neonates of the Rice Weevil Sitophilus oryzae L. (Coleoptera: Curculionidae), exposed to the insect growth regulator, Pyriproxyfen, on filter paper and on rough rice. In the first test, the hatch rate of eggs exposed on filter paper treated with Pyriproxyfen at the label rate of 0.003 mg [AI] /cm2 when used as a surface treatment in structures was 52.0 ± 7.3% compared to 93.0 ± 3.3% on untreated controls. In the second test, eggs were exposed to a dose-response series of 0.00003 to 0.03 mg [AI]/ cm2. Egg hatch was directly proportional to concentration and anged from 85.0 ± 2.0% on untreated controls to 26.7 ± 8.3% at the highest concentration tested. In the
... Show MoreThis paper study two stratified quantile regression models of the marginal and the conditional varieties. We estimate the quantile functions of these models by using two nonparametric methods of smoothing spline (B-spline) and kernel regression (Nadaraya-Watson). The estimates can be obtained by solve nonparametric quantile regression problem which means minimizing the quantile regression objective functions and using the approach of varying coefficient models. The main goal is discussing the comparison between the estimators of the two nonparametric methods and adopting the best one between them
The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac
... Show MorePurpose: The research aims to study the measurement of the performance of accounting units level of the research sample by using the Federal quality Model European (EFQM) Design/methodology/approach: the (EFQM) which included seven dimensions "Leadership, Strategic Planning, External Focus, Information and Analysis, Faculty / Staff and Workplace Focus, Process Effectiveness & Outcomes and Achievements" And its effect on the Control Environment, which includes three dimensions: "Integrity, management philosophy and commitment to powers" . the sample is supervisory units of colleges affiliated with the University of Baghdad in Iraq, and a sample was chosen that included fifty-one individuals in the accounting departments.
... Show More