Lung cancer, similar to other cancer types, results from genetic changes. However, it is considered as more threatening due to the spread of the smoking habit, a major risk factor of the disease. Scientists have been collecting and analyzing the biological data for a long time, in attempts to find methods to predict cancer before it occurs. Analysis of these data requires the use of artificial intelligence algorithms and neural network approaches. In this paper, one of the deep neural networks was used, that is the enhancer Deep Belief Network (DBN), which is constructed from two Restricted Boltzmann Machines (RBM). The visible nodes for the first RBM are 13 nodes and 8 nodes in each hidden layer for the two RBMs. The enhancer DBN was trained by Back Propagation Neural Network (BPNN), where the data sets were divided into 6 folds, each is split into three partitions representing the training, validation, and testing. It is worthy to note that the proposed enhancer DBN predicted lung cancer in an acceptable manner, with an average F-measure value of 0. 96 and an average Matthews Correlation Coefficient (MCC) value of 0. 47 for 6 folds.
Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the
Measurement of 238U, 233Th and 40K concentrations in soil samples collected from Ziggurat of Dur-Kurigalzu west region of Baghdad, have been evaluated, using high purity germanium detector. The activity concentrations of 238U, 233Th and 40K varied from 16.040 to 26.620 , 14.510 to 31.480 , and 153.820 to 266.320 with average values of 20.604±2.9 , 24.534±3.3 , 212.22±25.1 , respectively. The importance of these measurements lies in the estimation of radiation risk, radium equivalent, absorbed dose, annual effective dose, risk indices, gamma index, and cancer risk. The average value of the absorbed dose ranged from 33.187 outdoors to 63.111 indoo
... Show MoreObjective(s): To determine the impact of instructional intervention program upon psychological health status for
women who undergo chemotherapy after mastectomy
Methodology: The sample consisted of (100) women, (50) considered as study group, and another (50) the control
group. A pre test was done for both groups (study and control), and then the study samples were exposed to an
instructional intervention and three-dimensional post tests and the length of time between each test 21 days in
the Institute and Hospital of Radiation and Nuclear Medicine. The questionnaire composed of three parts, first,
demographic information; include (age, educational level, type of family, occupation, marital status, and adequacy
of mo
In this paper two modifications on Kuznetsov model namely on growth rate law and fractional cell kill term are given. Laplace Adomian decomposition method is used to get the solution (volume of the tumor) as a function of time .Stability analysis is applied. For lung cancer the tumor will continue in growing in spite of the treatment.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreSpeech recognition is a very important field that can be used in many applications such as controlling to protect area, banking, transaction over telephone network database access service, voice email, investigations, House controlling and management ... etc. Speech recognition systems can be used in two modes: to identify a particular person or to verify a person’s claimed identity. The family speaker recognition is a modern field in the speaker recognition. Many family speakers have similarity in the characteristics and hard to identify between them. Today, the scope of speech recognition is limited to speech collected from cooperative users in real world office environments and without adverse microphone or channel impairments.
Prenatal markers are commonly used in practice to screen for some foetal abnormalities. They can be biochemical or ultrasonic markers in addition to the newly used cell free Deoxyribonucleic Acid (DNA) estimation. This review aimed to illustrate the applications of the prenatal screening, and the reliability of these tests in detecting the presence of abnormal chromosomes such as trisomy-21, trisomy-18, and trisomy-13 in addition to neural tube defects. Prenatal markers can also be used in the anticipation of some obstetrical complications depending on levels of these markers in the mother’s circulation. In the developed countries, prenatal screening tests are regularly used during antenatal care period. Neural tube defects, numer
... Show MoreIn this work we used the environmentally friendly method to prepared ZrO2 nanoparticles utilizing the extract of Thyms plant In basic medium and at pH 12, the ZrO2 NPs was characterized by different techniques such as FTIR, ultraviolet visible, Atomic force microscope, Scanning Electron Microscopy, X-ray diffraction and Energy dispersive X-ray. The average crystalline size was calculated using the Debye Scherres equation in value 7.65 nm. Atomic force microscope results showed the size values for ZrO2 NPs were 45.11nm, and there are several distortions due to the presence of some large sizes. Atomic force microscope results showed the typical size values for ZrO2 NPs were 45.11 nm, and there are several distortions due to the presence of so
... Show MoreThe cytotoxic effect of different concentrations of Crude extracts of Bidens tripartita , Panex ginseng , Ceylon cinnamon and Citrullus colocynthis on mice mammary adenocarcinoma cell line were studied . The concentration used were 125 , 250, 500, 1000 Microgram/militer . The exracts were prepared by using hot water method . The preliminary chemical tests revealed acidic pH of all extracts. The time of exposure used were 24, 48 and 72 hrs.The results showed a clear toxic effect of all extracts depending on the time of exposure and the dose . The Ceylon cinnamon had the highest effect on adenocarcinoma 87.33% , followed by Bidens tripartita 86.79%, Citrullus colocynthis 74.39% and the lowes
... Show More