In this research, a mathematical model of tumor treatment by radiotherapy is studied and a new modification for the model is proposed as well as introducing the check for the suggested modification. Also the stability of the modified model is analyzed in the last section.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSome experiments need to know the extent of their usefulness to continue providing them or not. This is done through the fuzzy regression discontinuous model, where the Epanechnikov Kernel and Triangular Kernel were used to estimate the model by generating data from the Monte Carlo experiment and comparing the results obtained. It was found that the. Epanechnikov Kernel has a least mean squared error.
This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreJournal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author
... Show MoreMetal contents in vegetables are interesting because of issues related to food safety and potential health risks. The availability of these metals in the human body may perform many biochemical functions and some of them linked with various diseases at high levels. The current study aimed to evaluate the concentration of various metals in common local consumed vegetables using ICP-MS. The concentrations of metals in vegetables of tarragon, Bay laurel, dill, Syrian mesquite, vine leaves, thymes, arugula, basil, common purslane and parsley of this study were found to be in the range of, 76-778 for Al, 10-333 for B, 4-119 for Ba, 2812-24645 for Ca, 0.1-0.32 for Co, 201-464 for Fe, 3661-46400 for K, 0.31–1.
... Show MoreIn the past years, the Algerian Economy has witnessed various monetary developments characterized by different monetary and banking reforms aimed by monetary authorities to achieve monetary stability and driving overall growth. It should be noted that there is evidence to initiate fundamental changes on the basis of which new monetary, financing and banking policy mechanisms must be formulated in Algeria by enhancing the pursuit of reforming the monetary system, in order to improve monetary and economic indicators.
The study a
... Show MoreOne of the most important problems of IRAQI HEALTH MINISTRY and all healthy instruments in IRAQ is Chronic Diseases because it have a negative effects on IRAQI population, this is the aim of our study ,to specify the important Chronic diseases which make the population fell weakly, they are six diseases as the IRAQ ministry of health specified ( Diabetes, blood pressure diseases ,Brain diseases , Cardiology, Asthma, epilepsy) we got these data from IRAQI HEALTH MINISTRY ,bureau of planning and studies ,for the period 2009-2012,as monthly observations , represent sum of peoples have chronic diseases in Baghdad .
Our research obj
... Show Moreيھدف البحث الى اجراء تقدير دالة المعولية لتوزيــع ويبل ذي المعلمتين بالطرائـق المعلميــة والمتمثلة بـ (NWLSM,RRXM,RRYM,MOM,MLM (، وكذلك اجراء تقدير لدالة المعولية بالطرائق الالمعلمية والمتمثلة بـ . (EM, PLEM, EKMEM, WEKM, MKMM, WMR, MMO, MMT) وتم استخدام اسلوب المحاكاة لغرض المقارنة باستخدام حجوم عينات مختلفة (20,40,60,80,100) والوصول الى افضل الطرائق في التقدير باالعتماد على المؤشر االحصائي متوسط مربعات الخطا التكاملي (IMSE(، وقد توصل البحث الى
... Show MoreIn this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.
A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a
... Show More