In this paper, we estimate the survival function for the patients of lung cancer using different nonparametric estimation methods depending on sample from complete real data which describe the duration of survivor for patients who suffer from the lung cancer based on diagnosis of disease or the enter of patients in a hospital for period of two years (starting with 2012 to the end of 2013). Comparisons between the mentioned estimation methods has been performed using statistical indicator mean squares error, concluding that the survival function for the lung cancer by using shrinkage method is the best
This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreObjective(s): evaluation of effectiveness of cardiac rehabilitation instructional program on health-related quality of life and to find out the relationship between health-related quality of life and patient’s socio-demographic and clinical characteristics.
Methodology: A descriptive study design was carried out from 8th August, 2022 to 10th January, 2023.
A non-probability purposive sample of (50) patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases using pre-experimental design. The data were collected by direct interview with sample using questionnaire composed of three parts: part (1) Socio-demographic and clinical ch
... Show MoreObjective(s): evaluation of effectiveness of cardiac rehabilitation instructional program on health-related quality of life and to find out the relationship between health-related quality of life and patient’s socio-demographic and clinical characteristics. Methodology: A descriptive study design was carried out from 8th August, 2022 to 10th January, 2023. A non-probability purposive sample of (50) patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases using pre-experimental design. The data were collected by direct interview with sample using questionnaire composed of three parts: part (1) Socio-demographic and clinical characteristics which included 11 items. Part (2) Knowledge r
... Show MoreGreen synthesis is depending on preparation of nano composited SiO2/V2O5 by using the modified sol-gel method depending on rice husk ash as a source for the extraction of silica gel and the product powder of nano composited SiO2/V2O5 characterization by many techniques such as X-ray diffraction spectroscopy (XRD), field emission scanning electron microscopy (FESEM), and N2 adsorptions/desorption isotherms (BET). This study also includs the biological effectiveness of SiO2/V2O5 and its effect on inhibiting bacterial growth after the prepared nanomaterial was applied to wound dressings, which gave a promising result for its use as
... Show MoreThis study aimed to evaluate the anticancer activity and cell division arresting by dandelion methanolic extract on breast cancer cell line MCF-7 cancer cell line. For achieving this goal, cytotoxicity assay (MTT assay), multipara system assay: High Content Screening (HCS) which include (viable cell count VCC; membrane permeability MP; cellular mitochondrial permeability CMP; nuclear intensity NI and cytochrome C releasing ), reactive oxygen species detection and cell cycle phases division were tested. The results of this study showed the ability of the plant to reduce cancer cell viability in a dose-dependant manner within IC50 (141.0) in comparison to IC50 of (334.4) on the
... Show MoreThe purpose of this paper is to introduce and study the concepts of fuzzy generalized open sets, fuzzy generalized closed sets, generalized continuous fuzzy proper functions and prove results about these concepts.