PdII-Mediated Oxidative Amination for Access to a 9-Azabicyclo[4.2.1]nonane Compound Library and Anatoxin-a
...Show More Authors
Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration
... Show MoreThe aim of the current research is to verify the effect of the cognitive modeling strategy on the achievement of the chemistry course for the students of the first intermediate grade. To achieve the objective of the research, the null hypothesis was formulated via cognitive modeling strategy. The results showed that the experimental group's students performed better than the students in the control group. In the light of the results, the researchers concluded: The impact of the cognitive modeling strategy in the achievement of students of first intermediate grade in chemistry.
An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreCold plasma is a relatively low temperature gas, so this feature enables us to use cold plasma to treat thermally sensitive materials including polymers and biologic tissues. In this research, the non-thermal plasma system is designed with diameter (3 mm, 10 mm) Argon at atmospheric pressure as well as to be suitable for use in medical and biotechnological applications.
The thermal description of this system was studied and we observed the effect of the diameter of the plasma needle on the plasma, when the plasma needle slot is increased the plasma temperature decrease, as well as the effect of the voltages applied to the temperature of the plasma, where the temperature increasing with increasing the applied voltage . Results showed t
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreCox regression model have been used to estimate proportion hazard model for patients with hepatitis disease recorded in Gastrointestinal and Hepatic diseases Hospital in Iraq for (2002 -2005). Data consists of (age, gender, survival time terminal stat). A Kaplan-Meier method has been applied to estimate survival function and hazerd function.
Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show More