Preferred Language
Articles
/
qYa0d4YBIXToZYALOIvd
DYNAMIC MODELING FOR DISCRETE SURVIVAL DATA BY USING ARTIFICIAL NEURAL NETWORKS AND ITERATIVELY WEIGHTED KALMAN FILTER SMOOTHING WITH COMPARISON
...Show More Authors

Survival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms represented by Iteratively Weighted Kalman Filter Smoothing (IWKFS) algorithm and in combination with the Expectation Maximization (EM) algorithm. Average Mean Square Error (AMSE) and Cross Entropy Error (CEE) were used as comparison’s criteria. The methods and procedures were applied to data generated by simulation using a different combination of sample sizes and the number of intervals.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Research In Medical And Dental Science
Evaluation of Bond Strength of Acrylic Artificial Teeth with Unreinforced and Nano Silica Reinforced Denture Base Material after Chemical Disinfection
...Show More Authors

Soaking dentures with disinfection solutions is an effective way of keeping dentures in a healthy status; however, immersions in these solutions have a negative effect on the bond strength of denture base and denture teeth. The aim of this study was to evaluate the bond strength between denture acrylic teeth and heat-cured Poly (methyl methacrylate) denture base material (with and without nano silica) after disinfection with different chemical disinfectants for a simulated period of six months. One hundred specimens of maxillary central incisors attached to PMMA were divided into two groups; 50 specimens of PMMA without nano silica and 50 specimens of PMMA reinforced with 5 wt% of nano silica. Specimens of each group were immersed in five i

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison of fit among different types of post restorations luted with conventional cement
...Show More Authors

Background: with the advent of new postmaterial in dentistry, it has become important to measure fitness of post restoration along the horizontal plane of the root space.This study aimed to measure and compare, the cement film thickness of conventional zinc phosphate cement in micrometer between the post and root dentin along horizontal plane at different post space regions (coronal, middle and apical) of four types of posts, by using stereomicroscopy. Material and methods: Thirty-two extracted human maxillary canines, mandibular canines and maxillary central incisors (n=32) were instrumented with ProTaper system files (hand use) and obturated with gutta-percha for ProTaper and AH26® root canal sealer. After 24hrs of incubation at 37ºC, p

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering And Development
Comparison Study of (urinary & serum) AST Activity from Patients with type 2 diabetes
...Show More Authors

Aspartate aminotransferase was purified from urine and serum of patients with type 2 diabetes in a 2 steps procedure involving dialysis bag and sephadex G-25 gel filtration (column chromatography). The enzyme was purified 346.23 fold with 1467% yield and 3.46 fold with 142.85% yield in urine and serum of patients with type 2 diabetes respectively. The purified enzyme showed single peak. The results of this study revealed that AST activity of type 2 diabetes urine and serum increased significantly (p<0.001) compared with control group.

Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Using VGG Models with Intermediate Layer Feature Maps for Static Hand Gesture Recognition
...Show More Authors

A hand gesture recognition system provides a robust and innovative solution to nonverbal communication through human–computer interaction. Deep learning models have excellent potential for usage in recognition applications. To overcome related issues, most previous studies have proposed new model architectures or have fine-tuned pre-trained models. Furthermore, these studies relied on one standard dataset for both training and testing. Thus, the accuracy of these studies is reasonable. Unlike these works, the current study investigates two deep learning models with intermediate layers to recognize static hand gesture images. Both models were tested on different datasets, adjusted to suit the dataset, and then trained under different m

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
Study the performance of pentacene based organic field effect transistor by using monolayer, bilayer and trilayer with different gate insulators
...Show More Authors

In this paper, Pentacene based-organic field effect transistors (OFETs) by using different layers (monolayer, bilayer and trilayer) for three different gate insulators (ZrO2, PVA and CYEPL) were studied its current–voltage (I-V) characteristics by using the gradual-channel approximation model. The device exhibits a typical output curve of a field-effect transistor (FET). Source-drain voltage (Vds) was also investigated to study the effects of gate dielectric on electrical performance for OFET. The effect of capacitance semiconductor in performance OFETs was considered. The values of current and transconductance which calculated using MATLAB simulation. It exhibited a value of current increase with increasing source-drain voltage.

Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Iraqi Journal Of Physics
Study the performance of pentacene based organic field effect transistor by using monolayer, bilayer and trilayer with different gate insulators
...Show More Authors

In this paper, Pentacene based-organic field effect transistors (OFETs) by using different layers (monolayer, bilayer and trilayer) for three different gate insulators (ZrO2, PVA and CYEPL) were studied its current–voltage (I-V) characteristics by using the gradual-channel approximation model. The device exhibits a typical output curve of a field-effect transistor (FET). Source-drain voltage (Vds) was also investigated to study the effects of gate dielectric on electrical performance for OFET. The effect of capacitancesemiconductor in performance OFETs was considered. The values of current and transconductance which calculated using MATLAB simulation. It exhibited a value of current increase with increasing source-drain voltage.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Proposition of New Ensemble Data-Intelligence Models for Surface Water Quality Prediction
...Show More Authors

View Publication
Scopus (87)
Crossref (84)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Evaluation of The Nuclear Data on(α,n)Reaction for Natural Molybdenum
...Show More Authors

The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element

... Show More
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref