Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration on each subsystem to futher reduce the hardware requirements. The DNN was designed using a system generator and implemented using very hardware description language (VHDL). The system achievments outcomes the superior’s accuracy rate of approximately 99.6 percent in distinguishing bengin from malignant tissue. Also, the hardware resources were reduced by 30 percent from works of literature with an error rate of 7e-4 when using the Kintex-7 xc7k325t-3fbg676 board.
This work was included external morphological study of horse fly Tabanus indrae Hauser 1939 new record in Iraq, which belongs to family: Tabanidae order: Diptera. The study was involved the most important taxonomic external characters of the: head, thorax, abdomen and their appendages which are: antenna, maxillary palp, wings, legs, spotting in coloring pattern and female genitalia of abdomen
This study attempts to test the possibility of developing organizational performance in Zain Telecom by adapting the philosophy and concept of Organizational Identification and its dimensions, the most important of which are (Organizational Identification, organizational loyalty, organizational affiliation).To achieve the goal, the research relied on the questionnaire method, which is one of the methods of collecting information in field studies.
Due to the advantages over other metallic materials, such as superior corrosion resistance, excellent biocompatibility, and favorable mechanical properties, titanium, its alloys and related composites, are frequently utilized in biomedical applications, particularly in orthopedics and dentistry. This work focuses on developing novel titanium-titanium diboride (TiB2; ceramic material) composites for dental implants where TiB2 additions were estimated to be 9 wt.%. In a steel mold, Ti-TiB2 composites were fabricated using a powder metallurgy technique and sintered for five hours at 1200 °C. Microstructural and chemical properties were analyzed by energy dispersive X-ray spectroscopy (EDX), scanning electron microscopy (SEM), and X-ra
... Show MoreLaurylamine hydrochloride CH3(CH2)11 NH3 – Cl has been chosen from cationic surfactants to produce secondary oil using lab. model shown in fig. (1). The relationship between interfacial tension and (temperature, salinity and solution concentration) have been studied as shown in fig. (2, 3, 4) respectively. The optimum values of these three variables are taken (those values that give the lowest interfacial tension). Saturation, permeability and porosity are measured in the lab. The primary oil recovery was displaced by water injection until no more oil can be obtained, then laurylamine chloride is injected as a secondary oil recovery. The total oil recovery is 96.6% or 88.8% of the residual oil has been recovered by this technique as shown
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More