<p>Currently, breast cancer is one of the most common cancers and a main reason of women death worldwide particularly in<strong> </strong>developing countries such as Iraq. our work aims to predict the type of tumor whether benign or malignant through models that were built using logistic regression and neural networks and we hope it will help doctors in detecting the type of breast tumor. Four models were set using binary logistic regression and two different types of artificial neural networks namely multilayer perceptron MLP and radial basis function RBF. Evaluation of validated and trained models was done using several performance metrics like accuracy, sensitivity, specificity, and AUC (area under receiver operating characteristic ROC). Dataset was downloaded from UCI ml repository; it is composed of 9 attributes and 699 samples. The findings are clearly showing that the RBF NN classifier is the best in prediction of the type of breast tumors since it had recorded the highest performance in terms of correct classification rate (accuracy), sensitivity, specificity, and AUC (area under Receiver Operating Characteristic ROC) among all other models.</p>
This research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th
Praise be to God, Lord of the worlds, and prayers and peace be upon the most honorable of God’s creation, Muhammad bin Abdullah, the illiterate Arab prophet, the faithful, and his family and companions.
And yet ...
The realistic view is that Islamic jurisprudence is not exaggerated in the judgment of compensation, so it is judged for everything that has been lost by the victim of a profit or his loss, but he takes into account the bearing of the guarantee between profit and loss or the principle on which the theory of bearing liability is found, and it is clear through research that Islam The principle of respecting money, souls and rights is considered a public order, but it may exclude some ca
... Show MoreIn the current research, we investigated the absorption spectrum for R590 and C480 dyes in ethanol solvent for different dye solution concentrations of 10-4, 10-5 and 10-6M. These dyes have been prepared and studied before and after gamma irradiation (first, second ionization) using cesium-137 source with absorbed doses of 18.36 Gy (time exposure of 10 days) and 73.44 Gy (with time exposure of 40 days). We noticed that the absorption intensity was decreased with decreasing concentration, before gamma irradiation while the absorption spectrum peak shifted towards the short wavelength (blue shift). It was also found that the intensity of absorption spectrum increased and shifted the absorption spectrum peak towards the long wavelength (red
... Show MoreHuman interferon as is the case in all kinds of interferon has complex effects but all share their impact on preventing the proliferation of viruses and preventing or reducing human Alantervjørn conversion occurs if the cell is in preventing the growth of the virus when interferon Balnmstqubl connects
The combination of high protein content and a soft seed coat makes the wheat-rye hybrid Triticale (Triticosecale) vulnerable to attack by rice weevils. Drying triticale grain to moisture contents safe for storage can prevent infestation by rice weevils, but if grain is being stored for seed, high drying temperatures can affect seed germination. Grain can be effectively dried at low temperatures, but low-temperature drying is difficult in hot, humid regions such as the Gulf Coast. This study nvestigated the effects of drying temperatures from 35°C to 45°C on triticale seed germination and found no statistical differences between the germination rates of the seed at any of the drying temperatures and the germination rates of controls. Final
... Show MoreAbstract
The research aims to determine the impact of the strategy performance evaluation and of the Standards (leadership, people, knowledge, processes, financial) in the achievement of organizational effectiveness in accordance with the dimensions (planning and setting goals, Exploitation of the Environment, achieve the goals, the ability to adapt, information management and communications) and the relationship between them, the problem of the research in the growing interest in the process of performance evaluation for organizations, the erroneous belief that the performance evaluation activity is useful, and the fact that performance evaluation process is one of the main tasks of the work of the Office of the Inspecto
... Show Moreيهدف البحث الحالي الى استكشاف علاقات التفاعل والتاثير بين الاحتكام للمكانة والتوجه للفردية– الجماعية والدمج التنظيمي مستنداً على مزج اختلاف القيم الشخصية مع افكار نظرية الهوية الاجتماعية لبلورة نموذج البحث. وفي ضوء هذا تم صياغة عدد من الفرضيات التي توضح علاقات التفاعل ما بين ابعاد الاحتكام للمكانة والتوجه للفردية– الجماعية للتنبؤ بوجود الدمج التنظيمي. جمعت البيانات باستخدام استمارة الاستبيان ووزع
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show More