Contents IJPAM: Volume 116, No. 3 (2017)
Background:
Multiple sclerosis is a chronic disease believed to be the result of autoimmune disorders of the central nervous system, characterised by inflammation, demyelination, and axonal transection, affecting primarily young adults. Disease modifying therapies have become widely used, and the rapid development of these drugs highlighted the need to update our knowledge on their short- and long-term safety profile.
Objective:
The study aim is to evaluate the impact of disease-modifying treatments on thyroid functions and thyroid autoantibodies with subsequent effects on the outcome of the disease.
Materials and Methods:
A retro prospective study
... Show MoreThe purpose of this paper is to identifying the relationship between some visual functions and the level of achievement of air rifle shooting among young Iraqi female, and identifying the relationship between some functional variables of the respiratory and nervous systems at the level of achievement of air rifle shooting among young Iraqi female. The researchers used the descriptive approach in the correlative relationships style for its suitability and the research problem. The researchers determined the research community by the intentional method represented by (10) young female shooters who represent the national team with air rifle shooting effectiveness, and who represent (100%) of the research community. One of the most important re
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
In this study, gold nanoparticles (AuNPs) were synthesized using a plasma jet system at different exposure times. Using ultraviolet, visible spectra, X-ray diffraction, the nanoparticles were characterized (XRD). A Plasmon surface resonance concentrated at 530, 540, and 533 nm for the prepared AuNPs. The pattern of XRD showed that the extreme peaks of the film reflect crystalline existence. The face-centered cubic structure of the gold nanoparticles was prepared for all samples, with an average crystallite size of 25-40 nm. The effect of AuNPs in vivo on liver function levels was measured. For all doses, we notice an increase in the ranks of liver function in the blood during the period of dosing, and it begins to decrease when the dosi
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
Abstract
The research aims to build a training program to develop some executive functions for kindergarten children. To achieve this goal, the two researchers built the program according to the following steps:
1. Determining the general objective of the program.
2. Determining the behavioral objectives of the program.
3. Determining the included content in the program.
4. Implementing the content of the activities of the program.
5. Evaluating the Program.
The program included (12) training activities, the training activities included several items: the title of the activity, the time of implementation of the activity, the general objective of the activity, the procedural behavioral objective, the means and tools u
In this paper, first we refom1Ulated the finite element model
(FEM) into a neural network structure using a simple two - dimensional problem. The structure of this neural network is described
, followed by its application to solving the forward and inverse problems. This model is then extended to the general case and the advantages and di sadvantages of this approach are descri bed along with an analysis of the sensi tivity of
... Show MoreIn this paper we introduce a lot of concepts in bitopological spaces which are ij-ω-converges to a subset, ij-ω-directed toward a set, ij-w-closed functions, ij-w-rigid set, ij-w-continuous functions and the main concept in this paper is ij-w-perfect functions between bitopological spaces. Several theorems and characterizations concerning these concepts are studied.
Abstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show More