This paper is intended to apply data mining techniques for real Iraqi biochemical dataset to discover hidden patterns within tests relationships. It is worth noting that preprocessing steps take remarkable efforts to handle this type of data, since it is pure data set with so many null values reaching a ratio of 94.8%, then it becomes 0% after achieving these steps. However, in order to apply Classification And Regression Tree (CART) algorithm, several tests were assumed as classes, because of the dataset was unlabeled. Which then enabled discovery of patterns of tests relationships, that consequently, extends its impact on patients’ health, since it will assist in determining test values by performing only relevant tests. Therefore decreases the number of tests for patients.
Exploratory activities carried out by oil companies in the latter half of the past
century proved the existence of voluminous reserve of oil and gas in the
southwestern area of Iraq. In view of this, it seemed more than prudent to add a new
knowledge to that currently existing about the subsurface lithostratigraphy of this
area. As a first step in fulfilling this mission, this paper will attempt to do so by
covering the time interval from the Upper Cretaceous to the Neogene. In turn, this
effort had entailed both the description of about 4707 metres of fully recovered
cores, plus the subjection of more than 4000 samples to existing petrologic analyses.
Findings worth mentioning does include the observation that wi
A total of 54 abu mullet Planiliza abu (Heckel, 1843) were collected from two stations (north and south stations) along the Euphrates River near Samawa City, Al-Muthanna province and were examined during the period from October 2016 till September 2017 for parasites. Six out of 35 examined fishes from the north station (17.1%) and one out of 19 examined fishes (5.3%) from south station were infected with the microcotylid Solostamenides paucitesticulatus Kritsky & Öktener, 2015. The parasite was illustrated and described, and it is considered as a new record for the parasitic fauna of fishes of Iraq.
A cut-off low is a closed low with a low value of geopotential height at the upper atmospheric levels that has been fully detached (cut-off) from the westerly flow and move independently. A cut-off low causes extreme rainfall events in the mid-latitudes regions. The main aim of this paper is to investigate the cut-off low at 500 hPa over Iraq from a synoptic point of view and the behavior of geopotential height at 500 hPa. To examine the association of the cut-off low at 500 hPa with rainfall events across Iraq, two case studies of heavy rainfall events from different times were conducted. The results showed that the cut-off low at 500 hPa with a low value of geopotential height will strengthen the low-pressure system at the surface, lea
... Show MoreReceipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the cont
... Show MoreThe aim of this study is to assess the prevalence of lung infections among a group of hospitalized cancer patients who received chemotherapy as well as to describe a population of these patients. The clinical data and demographic information were collected from the archived files of in-patients referred to hematology center / Baghdad Teaching Hospital / Medical City , ministry of health, Iraq during the period of 2018.
This study was carried out on 250 patients with different types of cancer ,they were mostly of age group (40 - 49) 59 / 250 (23.6)% , (14-19) 49 /250 (19.6%) and (60-69) 41/ 250(16.4%) . The patients had two major types of hematological malignancies
... Show MoreA revised checklist of the robber fly genera (Diptera, Asilidae) was given during this study in Iraq. The investigation showed (21) genera belonging to seven subfamilies, two genera new recorded to entomofauna of Iraq (Promachus Loew, 1848 and Genus: Dysmacus Loew, 1860). Eight genera showed in this investigation and eleven genera were recorded previously to Iraq.
Abstract
This research’s goal is to restore and to revive the jurisprudence of Mother of Believers (Um alMuaamineen) “Um Salmah” "may God bless her", and to highlight her outstanding assimilation and understanding of religion and her conscious thought. The current research is a comparative scientific theoretical study represented in the comparison of jurisprudence of “Um Salamah” with Hadiths of fasting and pilgrimage rules as well as the duration mentioned in jurisprudence of for doctrines( 4 schools of thought )to identify these hadiths with the inclusion and discussion of their evidence.
The current research included two topics: the first one is to identify and introduce
... Show MoreInterested current Research measuring damage currency Swap by converting The ministry of higher Education and scientific Research money The Iraqi dinar To U.S dollar by Trade Bank Of Iraq , And that The damage Generated resulting from Deferent Between the Exchange Rate adopted From Central Bank of Iraq and Market Exchange Rate adopted by The Trade Bank Of Iraq , and Which led to the greet damage ( losses ) in Bearing by the ministry, which led to the reduction of the financial allocations for licensed curriculum outside of Iraq , and this in turn leads to reduction in the number of students Sender ( scholarships ) outside Iraq.
Where the estimated loss (damage) that suffer by the Ministry of H
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show More