ANN modeling is used here to predict missing monthly precipitation data in one station of the eight weather stations network in Sulaimani Governorate. Eight models were developed, one for each station as for prediction. The accuracy of prediction obtain is excellent with correlation coefficients between the predicted and the measured values of monthly precipitation ranged from (90% to 97.2%). The eight ANN models are found after many trials for each station and those with the highest correlation coefficient were selected. All the ANN models are found to have a hyperbolic tangent and identity activation functions for the hidden and output layers respectively, with learning rate of (0.4) and momentum term of (0.9), but with different data set sub-division into training, testing and holdout data sub-sets, and different number of hidden nodes in the hidden layer. It is found that it is not necessary that the nearest station to the station under prediction has the highest effect; this may be attributed to the high differences in elevation between the stations. It can also found that the variance is not necessary has effect on the correlation coefficient obtained.
Background: A case-control study design revealeda relationship between the present of fluoride, and the reduction of dental caries and the increase prevalence and severity of dental fluorosis .The aim of this study was to assess the prevalence and severity of dental caries in relation to dental fluorosis among school children in Al-Muthana'a Governorate. Materials and methods: It was conducted among primary school students aged 12 years old, the age was taken according to the criteria of World Health Organization (1997) (1).The number of students was selected in each sector of control group according to number of schools in that sector .Sectors of control group which depend on water of river as source of drinking water. Case group which inc
... Show MoreIncreasing material prices coupled with the emission of hazardous gases through the production and construction of Hot Mix Asphalt (HMA) has driven a strong movement toward the adoption of sustainable construction technology. Warm Mix Asphalt (WMA) is considered relatively a new technology, which enables the production and compaction of asphalt concrete mixtures at temperatures 15-40 °C lower than that of traditional hot mix asphalt. The Resilient modulus (Mr) which can be defined as the ratio of axial pulsating stress to the corresponding recoverable strain, is used to evaluate the relative quality of materials as well as to generate input for pavement design or pavement evaluation and analysis. Based on the aforementioned preface, it is
... Show MoreProblem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a
... Show More
Genetic material is the most important component of cells because it contains the genetic information; hence any disruption to the structure chromosome of cells could lead to very bad results. Genotoxicity use to evaluate the safety of any chemical compounds on genetic materials. Artificial food flavoring additive are chemical substances to produce specific placebo effects added to foods but impart specific flavor to it.
The present study evaluates the genotoxic effect of artificial food flavoring additive on structure of chromosomes at three different concentrations (50%, 100%and 150%) on both bone marrow cells and spleen cells in mice for fourteen successive days. It was found that artificial food flavoring addit
... Show MoreMarketing Intelligence is one of the important methods of collecting information about competitors ' products and changes in customers ' tastes and needs that contribute to determining the policies to be followed in product development.
The problem of research, which seeks to be answered by the extent to which the companies in question have the appropriate and effective mechanisms to develop their products, and the nature of the relationship between the components of marketing intelligence and new product development policies. The importance of research is determined by the importance of obtaining important and necessary information to make the appropriate decision on the development of the new product an
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThis study examined the tagged (the matter, its ruling, and examples of its applications in Ahmadiyya interpretations), the study of devising formulas of commissioning, especially the matter from the book of interpretation, which is: (Ahmadiyyeh’s interpretations), and the contemplative of the nature of (Ahmadiyya’s interpretations) realizes that the cognitive, linguistic and juristic knowledge product and the verses of judgments And other is the focus of this immortal travel, as it is truly a comprehensive book containing what the students of knowledge, scholars and the general public need in terms of interpreting the legal verses, and it is not possible to reach an understanding of the Book of God Almighty, and to clarify his purpo
... Show More