Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show MoreImage Fusion Using A Convolutional Neural Network
This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, wi
... Show MoreObjectives: With the advent of ongoing novel modalities toward the treatment of human epidermal growth factor receptor 2 (HER2)/NEU - positive malignancies, the serious side effects of chemoradiotherapy have been minimized. Hence, this study was conducted to identify the patterns of immunohistochemical expression of the promising therapeutic target (HER2/NEU) among Iraqi patients with medulloblastoma in an attempt to provide basic histological information’s that would help in future clinical researches.Materials and Methods: In this retrospective study, 42 formalin - fixed paraffin - embedded tissue blocks represent cases of surgically removed medulloblastomas were retrieved from the archived materials in a specialized surgical ho
... Show MoreBackground: Prolonged infections caused by High-risk HPVs have the potential to cause cancer in the regions of the body where they infect cells, including the cervix or the oropharynx, which refers to the rear part of the throat. Aims: To detection of Human Papillomavirus (HPV) -IgM , IL-10 and TNF among Iraqi women Methods: A total of 89 blood sample were collected from females with various cervical lesions and 40 blood samples were collected from apparently healthy along with a control group of 40 healthy females. The presence of Human Papillomavirus (HPV) -IgM, IL-10 and TNF in the collected samples was assessed using the ELISA technique. Results: The positivity rate of HPV IgM was 13.5%. This positivity was higher among individuals age
... Show MoreThis paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis