Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breathing difficulty) used to diagnose the person being infected by COVID-19 virus or not. Secondly, this approach divides the infected peoples into four classes, based on their immune system risk level (very high degree, high degree, mild degree, and normal), and using two indices of age and current health status like diabetes, heart disorders, or hypertension. Where, these people are graded and expected to comply with their class regulations. There are six important COVID-19 virus infections of different classes that should receive immediate health care to save their lives. When the test is positive, the patient age is considered to choose one of the six classifications depending on the patient symptoms to provide him the suitable care as one of the four types of suggested treatment protocol of COVID-19 virus infection in COVID-19 DSS application. Finally, a report of all information about any classification case of COVID-19 infection is printed where this report includes the status of patient (infection level) and the prevention protocol. Later, the program sends the report to the control centre (medical expert) containing the information. In this paper, it was suggested the use of C4.5 Algorithm for decision tree.
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreEuropean Chemical Bulletin (ISSN 2063-5346) is a peer-reviewed journal that publishes original research papers, short communications, and review articles in all areas of chemistry. European Chemical Bulletin has eight sections, namely
A Field experiment was conducted in Horticulture and Landscape Department, College of Agricultural Engineering Sciences, University of Baghdad, Al-Jadriah during fall 2019-2020 to study nutrient and water use efficiency of broccoli cultivated hydroponically on alternative solution ABEER. Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is gas enrichment (O2 and O3), Then levels of second factor were randomly distributed within each replicate, which included spraying with plants extracts which was Moringa leaves extract and Coconut water at two concentrations 2, 4 %and 5
Is the subject of Facebook of more topics that aroused interest and that it provides the features and services that allows users to direct communication and interaction and dialogue with others, and deals with the subject of research the use of Facebook and its effects left by the social relations, as the field study was conducted on a sample of 130 students from students Baghdad University of males and females in the Faculty of Political Science and Agriculture, Science and Education, Girls, and limited the sample to Facebook users exclusively to test the study hypotheses and relationships connectivity, and the results revealed the presence of a significant impact of Facebook in th
... Show MoreRecent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show MoreThe Back-Propagation (BP) is the best known and widely used learning algorithm in training multiple neural network. A vast variety of improvements to BP algorithm have been proposed since ninety’s. in this paper, the effects of changing the number of hidden neurons and activation equation are investigated. According to the simulation results, the convergence speed have been improved and become much faster by the previous two modifications on the BP algorithm.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe study was conducted to determine the effect Toxoplasma gondii and the efficacy of azithromycin and garlic tablets on the treatment of acute murine toxoplasmosis and observe the histopathological changes due to infection. 60 Albino mice were divided into six groups, and their survival rate, pathology, bioassay trial and immunofluorescence were observed. Results revealed that azithromycin (250 mg/kg/day) given to infected mice increased the survival rate (90% on day 7 PI) and decreased the histopathological changes when compared with the control groups. Garlic tablets (500 mg/kg/day) had lesser effect on infected mice, and the survival rate (40% at days 6 and 7 PI) was lower than the groups treated with azithromycin. The group treated wit
... Show More
