Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin’s method), The nonparametric model is estimated by using kernel smoothing (Nadaraya Watson), K-Nearest Neighbor smoothing and Median smoothing. The Flower Pollination algorithms were employed and structured in building the ecological model and estimating the semi-parametric regression function with measurement errors in the explanatory and dependent variables, then compare the models to choose the best model used in the environmental scope measurement errors, where the comparison between the models is done using the mean square error (MSE).
Chronic Hepatitis B(CHB) is a serious sequel after Hepatitis B Virus infection, although the rate of chronicity is inverse with age but it may be associated with a significant proportion of deaths related to cirrhosis and liver cancer. HBV serology and measurement of hepatocytic enzymes with viral load can predict disease prognosis and response to treatment. HBeAg refers to a high viral replication and associated with more infectivity to others. This study aimed to determine the impact of HBeAg status in chronically infected patients on various baseline tests. A total of 90 patients with CHB infection who were included in this study. Several standardized measures used for liver function tests, viral load and hepatitis B serological
... Show MoreObjective: Pregnancy-induced hypertension (PIH) is a major pregnancy complication that leads to maternal mortality. Here, we have scrutinized the correlation between serum levels of hydrogen peroxide (H2O2) and superoxide dismutase (SOD) in PIH.Methods: Serum samples were collected from 80 Iraqi women (40 women with PIH as patients group, 20 normotensive pregnant women as a positive control, and 20 normotensive non-pregnant women as a negative control) all groups were diagnosed clinically.Results: Serum of H2O2 and SOD levels was measured for all studied groups. Results showed that there were no significant variances in age and gestational age distribution between all studied groups. Furthermore, result showed that the serum level o
... Show MoreModified unsaturated polyester (MUPE) was blended with Cellulose (Cls) and with ethyl cellulose (ECls) at ambient conditions in the presence of ethyl methyl ketone peroxide (EMKP) as hardener. The blends containing different weight percentages (5-25 %) of Cls or ECls. Mechanical properties (impact strength, hardness, and bending) and dielectric constant were determined. The results observed that Cls increases the impact strength, hardness, and dielectric constant and decreases the bending of the MUPS, while ECls causes an increase in the three mechanical behaviours and a decrease in the dielectric constant of the MU-PS.
AS Salman, SK Hameed…, Karbala Journal of Physical Education Sciences, 2020
Background: Helicobacter pylori are important gastrointestinal pathogen associated with gastritis, peptic ulcers, and an increased risk of gastric carcinoma. There are several popular methods for detection of H. pylori (invasive and non-invasive methods) each having its own advantages, disadvantages, and limitations, and by using PCR technique the ability to detect H. pylori in saliva samples offers a potential for an alternative test for detection of this microorganism. Materials and methods: The study sample consists of fifty participants of both genders, who undergo Oesophageo-gastrodudenoscopy at the Gastroenterology Department of Al-Kindy Teaching Hospital Baghdad/ Iraq, during five months period from January 2014 to May 2014. They we
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More