<p>Currently, breast cancer is one of the most common cancers and a main reason of women death worldwide particularly in<strong> </strong>developing countries such as Iraq. our work aims to predict the type of tumor whether benign or malignant through models that were built using logistic regression and neural networks and we hope it will help doctors in detecting the type of breast tumor. Four models were set using binary logistic regression and two different types of artificial neural networks namely multilayer perceptron MLP and radial basis function RBF. Evaluation of validated and trained models was done using several performance metrics like accuracy, sensitivity, specificity, and AUC (area under receiver operating characteristic ROC). Dataset was downloaded from UCI ml repository; it is composed of 9 attributes and 699 samples. The findings are clearly showing that the RBF NN classifier is the best in prediction of the type of breast tumors since it had recorded the highest performance in terms of correct classification rate (accuracy), sensitivity, specificity, and AUC (area under Receiver Operating Characteristic ROC) among all other models.</p>
Background: The fracture of instruments within root canal during endodontic treatment is a common incidence, fracture because of fatigue through flexure occurs due to metal fatigue, this study aimed to assess the effect of curvature angle and rotational speed on the cyclic fatigue of different type of Endodontic NiTi Rotary Instruments and compare among them. Materials and method: Three types of rotary instruments with tip size 0.25: ProTaPer F2 (Densply, Malifier) Revo-S SU( 0.06 taper, MicroMega) and RaCe system (0.06 taper, FKG, Dentaire), Forty file of each instrument were used within two canals with angle of curvature (40 &60 )at two speed (250&400)RPM, twelve group were formed for all instruments(total number=120),ten file fo
... Show MoreIn this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this
... Show MoreBreast cancer is the most common malignancy affecting women's health, with an increasing incidence worldwide. This study aimed to measure the intracellular concentration of the hypoxia-inducible factor 1 α (HIF-1α), tumor suppression protein p53, and estradiol (E2) in tumor tissues of adult females with breast cancer and their relation to tumor grade, tumor size, and lymph node metastases (LNM). The study was conducted on 65 adult female participants with breast mass admitted to the operating theater in Al-Hussein Teaching Hospital and Al-Habboby Teaching Hospital in Nasiriyah, Iraq, from January to November 2021. Fresh breast tumor tissues were collated and homogenized for intracellular biochemical analysis using the enzyme-linked immuno
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o
... Show MoreThe skull is one of the largest bones in the body. It is classified into flat bones that maintain the important organic structures; which are the brain, eyes, and tongue. The skull is a strong support for preserving these organs but they are various according to the type of animals and the environments in which they live and the nature of their nutrition. There are many differences among living organisms in terms of the bones in the skull, their difference or disappearance and their length in the shape of the head. The samples were taken from the scientific storage in the Iraq Natural History Research Center and Museum; Cape hare Lepus capensis (Linnaeus, 1758) and Red fox Vulpes vulpes (Linnaeus, 1758) and the study was conducted o
... Show MoreThis study aims to reveal the role of one of the artificial intelligence (AI) techniques, “ChatGPT,” in improving the educational process by following it as a teaching method for the subject of automatic analysis for students of the Chemistry Department and the subject of computer security for students of the Computer Science Department, from the fourth stage at the College of Education for Pure Science (Ibn Al-Haitham), and its impact on their computational thinking to have a good educational environment. The experimental approach was used, and the research samples were chosen intentionally by the research community. Research tools were prepared, which included a scale for CT that included 12 items and the achievement test in b
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show More