The dynamic development of computer and software technology in recent years was accompanied by the expansion and widespread implementation of artificial intelligence (AI) based methods in many aspects of human life. A prominent field where rapid progress was observed are high‐throughput methods in biology that generate big amounts of data that need to be processed and analyzed. Therefore, AI methods are more and more applied in the biomedical field, among others for RNA‐protein binding sites prediction, DNA sequence function prediction, protein‐protein interaction prediction, or biomedical image classification. Stem cells are widely used in biomedical research, e.g., leukemia or other disease studies. Our proposed approach of
... Show MoreThis study aims to explain the purposes of thinking in light of the Holy Qur’an. The study adopted the deductive method by analyzing the meanings of the eighteen thinking verses mentioned in the Holy Qur’an That is by referring to the ancient and contemporary book interpretations and inferring the purposes of thinking from the context of those verses. The study concluded that there are seven main purposes, for thinking in the light of the Holy Qur’an, are understanding the universal regulations, contemplating the social codes, inferring, extracting maxims and meanings from the Qur’anic proverbs, analyzing the situation objectively, balancing between interests and evils, and freeing the mind from the authority of the paranormal. T
... Show MoreSpecialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give
... Show MoreBackground: the early identification of developmental disabilities allows intervention at the earliest possible point to
improve the developmental potential.
Objective: Identify the scope of knowledge of nurses toward signs of gross motor delay for children and its relation to
their demographic characteristics.
Methodology: A descriptive study design was conducted at (18) primary health care centers in first of the primary
health care sector of Alhawija District in Kirkuk Governorate. This study started from September 2010 to the end of
January 2011, in order to identify the level of nurses' knowledge toward signs of gross motor delay for children in
primary health care centers. Non probability (purposive) sample of
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreAbstract:
Under the state scenario, fiscal policy will not be able to use the oil surpluses optimally and economically and society, as long as these surpluses are not directed by public expenditure towards new productive investments and by following the path of fiscal policy after one year 2003 and until 2013 we note that it is based on the method of spending (excessive) consumption, and did not take any action towards the budget deficit planned at the beginning of the fiscal year, and the actual surplus at the end of the fiscal year, which represents the highest expenditure in the budget, Salaries and wages of workers in various government agencies with the expansion of spending on the security side.&n
... Show MoreThe study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show More