Breast cancer is the second deadliest disease infected women worldwide. For this
reason the early detection is one of the most essential stop to overcomeit dependingon
automatic devices like artificial intelligent. Medical applications of machine learning
algorithmsare mostly based on their ability to handle classification problems,
including classifications of illnesses or to estimate prognosis. Before machine
learningis applied for diagnosis, it must be trained first. The research methodology
which isdetermines differentofmachine learning algorithms,such as Random tree,
ID3, CART, SMO, C4.5 and Naive Bayesto finds the best training algorithm result.
The contribution of this research is test the data set with missing value and without
missing value, where the missing value is one attribute is missing from one sample
for data set. The test result is show SMO is the best algorithm, especiallywhen the
research removes the samples that contained the missing value.
The aim of this research to study.
The dimensions of organizational learning have been defined(learning dynamics, individuals empowerment, knowledge management and technology application) as well as the dimensions of learning organization have been defined (culture values, knowledge transfer, communication and employee characteristics), Asset completion questionnaire was used to collect data of this research from a purposely sample represent forty employees who works in Iraqi Planning Ministry at different positions. The research divided to four parts :
The first to the research methodology, the second to the theoretical review o
... Show MoreAbstract Background: The human epidermal growth factor receptor 2(HER2) proto-oncogene is overexpressed or amplified in approximately 15%-25% of invasive breast cancers. Approximately 35% of HER2-amplified breast cancers have coamplification of the topoisomerase II-alpha (TOP2A) gene encoding an enzyme that is a major target of anthracyclines. Hence, the determination of genetic alteration (amplification or deletion) of both genes is considered as an important predictive factor that determines the response of breast cancer patients to treatment. The aims of this study are to determinate TOP2A status gene amplification in a set of Iraqi patients with breast cancer that have had an equivocal (2+) and positive HER2/neu by immunohistochemistry
... Show MoreIn this study Isolated Pathogenic bacteria which causes Conjunctivitis in Children with ages between less than 3 year to17 years, admitted to Ibn Al-Haitham Eye Specialist Hospital. 102 cases were collected which include 69 Male Formed (68%) and 33 Female Formed (32%). The result of the recent study shows that the highest percentage of Male was 21% for 1113year ages and the lowest percentage was 3% for less than 3 year to 5 year ages. In Female the highest percentage was 15% for 9-11year ages and the lowest percentage was 1% for 1517year ages. In this study fifty tow isolates were identified, Gram Positive Bacteria were Predominant compared with Gram Negative Bacteria. With 32 isolates which formed (62%) whereas the number o
... Show MoreData mining is a data analysis process using software to find certain patterns or rules in a large amount of data, which is expected to provide knowledge to support decisions. However, missing value in data mining often leads to a loss of information. The purpose of this study is to improve the performance of data classification with missing values, precisely and accurately. The test method is carried out using the Car Evaluation dataset from the UCI Machine Learning Repository. RStudio and RapidMiner tools were used for testing the algorithm. This study will result in a data analysis of the tested parameters to measure the performance of the algorithm. Using test variations: performance at C5.0, C4.5, and k-NN at 0% missi
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThis paper studies the behavior of reinforced Reactive Powder Concrete (RPC) two-way slabs under static and repeated load. The experimental program included testing six simply supported RPC two-way slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. All the tested specimens were identical in their material properties, and reinforcement details except their steel fibers content. They were cast in three pairs, each one had a different steel fibers ratio (0.5 %, 1 %, and 1.5 %) respectively. In each pair, one specimen was tested under static load and the other under five cycles of repeated load (loading-unloading). Static test results revealed that increasing steel fibres volume fraction from 0.5 % to 1 % and from 1% to 1.5%,
... Show More<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T
... Show MoreBack ground:Fine needle aspiration (FNA) is indicated in the exploration of superficial and deep masses. The accuracy of this procedure differs in various studies, and according to the organ explored. Palpable mammary masses of concern to the patient or clinician should be aspirated, regardless of imaging findings.
Objective: The present study aimed at evaluation of cytological results of FNA of different palpable breast lesions, using histopathological diagnosis as the gold standard for final diagnosis.
Patients & Methods: This prospective study includes 289 females with palpable breast lesions. FNA aspiration was conducted in a private out patient clinic during the period of 1994-2004. The cytolo
This study was conducted for evaluating the cytotoxic effect of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli on the proliferation of primary cancer cell cultures, obtained from tumor samples that were collected from (13) cancer patients and as follows: (five colon cancer patients, two bladder cancer patients, two breast cancer patients, two stomach cancer patients and two lung cancer patients), and on normal cell line (rat embryonic fibroblast / REF) (in vitro) with the use of different concentrations starting from (1) mg/ml and ending with (0.0002) mg/ml by making two fold serial dilutions by using the 96- well microtiter plate, and in comparison with negative (PBS) and positive (MMC, at concentration
... Show MoreThe literature shows conflicting outcomes, making it difficult to determine how e-learning affects the performance of students in higher education. The effect of e-learning was studied and data has been gathered with the utilization of a variety of qualitative and quantitative methods, especially in relation to students' academic achievements and perceptions in higher education, according to literature review that has been drawn from articles published in the past two decades (2000-2020). The development of a sense of community in the on-line environment has been identified to be one of the main difficulties in e-learning education across this whole review. In order to create an efficient online learning community, it could be claim
... Show More