Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning algorithms implementation in the recurrent stroke prediction models. This research aims to investigate and compare the performance of machine learning algorithms using recurrent stroke clinical public datasets. In this study, Artificial Neural Network (ANN), Support Vector Machine (SVM) and Bayesian Rule List (BRL) are used and compared their performance in the domain of recurrent stroke prediction model. The result of the empirical experiments shows that ANN scores the highest accuracy at 80.00%, follows by BRL with 75.91% and SVM with 60.45%.
importumt educational institution as (kindergartens) need teachers which qualified ownes modalities in their education for children , as Marzanu method in a way of learning and own methods of crisis management, because the teachers that own those styles of learning ginekindergarten children knowledge and the childrenIeaving based on theMeaing and knowledge and integration of their information, And teachers that earn methods of crisis management provide for the children of the kindergarten security within the educational institution which in turn affect the growth and development of the Child and then abilities, health physical, mental, psychological …etc.., The aims of the current research have identified to recognize: 1- the dimension
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreAutomatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show More<span lang="EN-US">Diabetes is one of the deadliest diseases in the world that can lead to stroke, blindness, organ failure, and amputation of lower limbs. Researches state that diabetes can be controlled if it is detected at an early stage. Scientists are becoming more interested in classification algorithms in diagnosing diseases. In this study, we have analyzed the performance of five classification algorithms namely naïve Bayes, support vector machine, multi layer perceptron artificial neural network, decision tree, and random forest using diabetes dataset that contains the information of 2000 female patients. Various metrics were applied in evaluating the performance of the classifiers such as precision, area under the c
... Show MoreThe aim of this research is controlling the amount of the robotic hand catching force using the artificial muscle wire as an actuator to achieve the desired response of the robotic hand in order to catch different things without destroying or dropping them; where the process is to be similar to that of human hand catching way. The proper selection of the amount of the catching force is achieved through out simulation using the fuzzy control technique. The mechanism of the arrangement of the muscle wires is proposed to achieve good force selections. The results indicate the feasibility of using this proposed technique which mimics human reasoning where as the weight of the caught peace increases, the force increases also with approximatel
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreAbstract:
Objectives: The present study aims to evaluate effectiveness of educational program the nurses' knowledge towards early prediction of acquired weakness in the intensive care unit.
Methodology: A pre-experimental study design (comparison of two groups), which was achieved through the pre and post-test method for the study sample through the application of an educational program in the intensive care unit of Al-Zahra Teaching Hospital in Kut city, Wasit Governorate. The study was conducted for the period from 28th April 2022 to 15th August 2022 by selecting a purposive (non-probability) sample for this study. The study sample size was (52) nu
... Show More This research aims to estimate stock returns, according to the Rough Set Theory approach, test its effectiveness and accuracy in predicting stock returns and their potential in the field of financial markets, and rationalize investor decisions. The research sample is totaling (10) companies traded at Iraq Stock Exchange. The results showed a remarkable Rough Set Theory application in data reduction, contributing to the rationalization of investment decisions. The most prominent conclusions are the capability of rough set theory in dealing with financial data and applying it for forecasting stock returns.The research provides those interested in investing stocks in financial
... Show MoreInfection with cryptosporidiosis endangers the lives of many people with immunodeficiency, especially HIV patients. Nitazoxanide is one of the main therapeutic drugs used to treat cryptosporidiosis. However, it is poorly soluble in water, which restricts its usefulness and efficacy in immunocompromised patients. Surfactants have an amphiphilic character which indicates their ability to improve the water solubility of the hydrophobic drugs. Our research concerns the synthesis of new cationic Gemini surfactants that have the ability to improve the solubility of the drug Nanazoxide. So, we synthesized cationic Gemini surfactants. N1,N1,N3,N3-tetramethyl-N1,N3-bis(2-octadecanamidoethyl)propane-1,3-diaminium bromide (CGSPS18) and 2,2‘-(etha
... Show More