<p>Currently, breast cancer is one of the most common cancers and a main reason of women death worldwide particularly in<strong> </strong>developing countries such as Iraq. our work aims to predict the type of tumor whether benign or malignant through models that were built using logistic regression and neural networks and we hope it will help doctors in detecting the type of breast tumor. Four models were set using binary logistic regression and two different types of artificial neural networks namely multilayer perceptron MLP and radial basis function RBF. Evaluation of validated and trained models was done using several performance metrics like accuracy, sensitivity, specificity, and AUC (area under receiver operating characteristic ROC). Dataset was downloaded from UCI ml repository; it is composed of 9 attributes and 699 samples. The findings are clearly showing that the RBF NN classifier is the best in prediction of the type of breast tumors since it had recorded the highest performance in terms of correct classification rate (accuracy), sensitivity, specificity, and AUC (area under Receiver Operating Characteristic ROC) among all other models.</p>
One of the most important problems that would continuously face the Higher education organizations is how to improve the service level presented by them, and how this can lead to increase demand for services of this organizations.As this issue has exhausted many organizations pushed some of them to withdraw from the market Because of weaknesses in their services. Here lies the importance of this matter to be given more attention in order to maintain the organization competitive position. According to that, The selection of the research title (The Impact of Quality on the Level of the University Service Request) which seeks to measure the impact of service quality on the level of demand, At a time when world&
... Show MoreThe research stems from its goal of identifying the impact of visual management on the strategic acceleration of business organizations and the state of this effect through the knowledge embedding in the Iraqi oil companies. The oil sector was tested, represented by (3) oil companies, and a sample of (151) individuals who participated in activating the visual management, distributed in higher management levels. The research relied on the descriptiveanalytical approach and the questionnaire was a main tool for collecting data and information. The results showed that visual management positively affects strategic acceleration. Moreover, This effect is amplified by the mediating role played by Embedding Knowledge.
Monetary policy is an important part of the economic policy to influence the monetary aspect of stabilization, for this reason the research will seek to clarify the extent of the impact of monetary policy in achieving monetary stability in Iraq during the chosen research period, because the Iraqi economy suffers from monetary instability due to political and security turmoil, Therefore, an effective and effective monetary policy is required in terms of reducing inflationary pressures to reach the required monetary stability, in order to create the appropriate monetary environment for the work of the economic and productive sectors. Thus, the research adopted a basic hypothesis that monetary policy in Iraq has a clear impact on achieving mon
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreIn the present work, heterojunction diode detectors will be prepared using germanium wafers as a substrate material and 200 nm tin sulfide thickness will be evaporated by using thermal evaporation method as thin film on the substrate. Nd:YAG laser (λ=532 nm) with different energy densities (5.66 J/cm2 and 11.32 J/cm2) is used to diffuse the SnS inside the surface of the germanium samples with 10 laser shots in different environments (vacuum and distilled water). I-V characteristics in the dark illumination, C-V characteristics, transmission measurements, spectral responsivity and quantum efficiency were investigated at 300K. The C-V measurements have shown that the heterojunction were of abrupt type and the maximum value of build-in pot
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreAn anatomical study was carried out at the College of Agricultural Engineering Sciences, University of Baghdad, in 2017, on lupine crop (Lupinus albus) as a comparison guide of three seed weights of three lupine cultivars viz. ‘Giza-1’, ‘Giza-2’ and ‘Hamburg’. The nested design was used with four replications. The results showed that cultivars had a significant effect on stem anatomical traits. ‘Hamburg’ cultivar recorded the highest stem diameter, cortex thickness and xylem vascular diameter, while cultivar ‘Giza-1’ recorded the lowest values for the same traits as well as the highest collenchyma layer thickness, vascular bundle thickness, and xylem thickness. Cultivar ‘Giza-2’ recorded the lowest vascular b
... Show More