This paper uses Artificial Intelligence (AI) based algorithm analysis to classify breast cancer Deoxyribonucleic (DNA). Main idea is to focus on application of machine and deep learning techniques. Furthermore, a genetic algorithm is used to diagnose gene expression to reduce the number of misclassified cancers. After patients' genetic data are entered, processing operations that require filling the missing values using different techniques are used. The best data for the classification process are chosen by combining each technique using the genetic algorithm and comparing them in terms of accuracy.
In the last few years, the literature conferred a great interest in studying the feasibility of using memristive devices for computing. Memristive devices are important in structure, dynamics, as well as functionalities of artificial neural networks (ANNs) because of their resemblance to biological learning in synapses and neurons regarding switching characteristics of their resistance. Memristive architecture consists of a number of metastable switches (MSSs). Although the literature covered a variety of memristive applications for general purpose computations, the effect of low or high conductance of each MSS was unclear. This paper focuses on finding a potential criterion to calculate the conductance of each M
... Show MoreThe gravity anomalies of the Jurassic and deep structures were obtained by stripping the gravity effect of Cretaceous and Tertiary formations from the available Bouguer gravity map in central and south Iraq. The gravity effect of the stripped layers was determined depending on the density log or the density density obtained from the sonic log. The density relation with the seismic velocity of Gardner et al (1974) was used to obtain density from sonic logs in case of a lack of density log. The average density of the Cretaceous and Tertiary formation were determined then the density contrast of these formations was obtained. The density contrast and thickness of all stratigraphic formations in the area between the sea level to t
... Show MoreAbstact:
Nursery is one of educational institution in the process of developing the
social concepts that it includes a quirking the knowledge and experiences that
help the kid to adjust with environment through arrangement words ,
movements and concrete things which are transferred to the kids so as to
realize these concepts .
Social concepts are numbers of words and statements with social nature
which the kids learn through the family or nursery in order to effect their
educational style of independent and helping the others .
The re searcher adopted this theory because of the little studies in the
filed of social concepts in the nursery.
The aims of the study are as following :
1- building tools for
Background: Breast cancer (BC) is the most widespread cancer among women worldwide. Its incidence and mortality rates have risen in the previous three decades as a result of changes in risk factor profiles, improved cancer registry, and cancer detection. Objective: The study's goals were to establish if Ki-67 could be used as a potential marker in serum of cancer disease patients as well as their interaction with vascular endothelial growth factor (VEGF) and ES in various stages of breast cancer to assess their function in the progression of BC. Materials and Methods: The levels of Ki-67, VEGF and endostatin (ES) in serum were assessed by commercial enzyme linked immunosorbent assay (ELISA) kits in 60 women diagnosed with breast cancer
... Show MoreIn this research, silver nanoparticles (AgNPs) were manufactured using aqueous extract of mushroom Pleurotus ostreatus. Anticancer potential of AgNPs was investigated versus human breast cancer cell line (MCF-7). Cytotoxic response was assessed by MTT assay. AgNPs showed inhibition effect at the following concentrations 12.5, 25, 50, 100 and 200 µg/ml versus MCF-7 cell line, and all treatments had a positive result. The MCF-7 cells were inhibited up to 85.14 % at the concentration 200 μg/ml of AgNPs which reduced cells viability to 14.86%, while 12.5 μg/ml of AgNPs caused 24.23% cells inhibition with reduction of cells viability to 75.77%.
Abstract
The study aims to build a training program based on the Connectivism Theory to develop e-learning competencies for Islamic education teachers in the Governorate of Dhofar, as well as to identify its effectiveness. The study sample consisted of (30) Islamic education teachers to implement the training program, they were randomly selected. The study used the descriptive approach to determine the electronic competencies and build the training program, and the quasi-experimental approach to determine the effectiveness of the program. The study tools were the cognitive achievement test and the observation card, which were applied before and after. The study found that the effectiveness of the training program
... Show MoreE-learning is a necessity imposed by the Corona pandemic, which has disrupted various educational institutions in the world, but some of these institutions have not been affected and education has continued with them, due to their flexible educational system that was able to employ technology in the continuity of the educational process in the so-called e-learning, because It has characteristics that make it the most suitable alternative to avoid the consequences of the Corona pandemic and its damage to the educational process, as e-learning is one of the modern methods that contribute to enhancing the effectiveness of the learner, and enabling him to assume greater responsibility compared to traditional education, so the learner becomes
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More