Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using a training data rather than cross validation. The decision tree algorithm J48 is applied to detect and generate the pattern of attributes, which have the real effect on the class value. Furthermore, the experiments are performed with three machine learning algorithms J48 decision tree, simple logistic, and multilayer perceptron using 10-folds cross validation as a test option, and the percentage of correctly classified instances as a measure to determine the best one from them. As well as, this investigation used the iteration control to check the accuracy gained from the three mentioned above algorithms. Hence, it explores whether the error ratio is decreasing after several iterations of algorithm execution or not. Conclusion It is noticed that the error ratio of classified instances are decreasing after 5-10 iterations, exactly in the case of multilayer perceptron algorithm rather than simple logistic, and decision tree algorithms. This study realized that the TPS_pre is the most common effective attribute among three main classes of examined dataset. This attribute highly indicates the BC inflammation.
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreThe Asymmetrical Castellated concavely – curved soffit Steel Beams with RPC and Lacing Reinforcement improves compactness and local buckling (web and flange local buckling), vertical shear strength at gross section (web crippling and web yielding at the fillet), and net section ( net vertical shear strength proportioned between the top and bottom tees relative to their areas (Yielding)), horizontal shear strength in web post (Yielding), web post-buckling strength, overall beam flexure strength, tee Vierendeel bending moment and lateral-torsional buckling, as a result of steel section encasement. This study presents two concentrated loads test results for seven specimens Asymmetrical Castellated concavely – curved soffit Steel Be
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreABSTRICT:
This study is concerned with the estimation of constant and time-varying parameters in non-linear ordinary differential equations, which do not have analytical solutions. The estimation is done in a multi-stage method where constant and time-varying parameters are estimated in a straight sequential way from several stages. In the first stage, the model of the differential equations is converted to a regression model that includes the state variables with their derivatives and then the estimation of the state variables and their derivatives in a penalized splines method and compensating the estimations in the regression model. In the second stage, the pseudo- least squares method was used to es
... Show MoreIn this work, plasma parameters such as (electron temperature (Te), electron density (ne), plasma frequency (fp) and Debye length (λD)) were studied using spectral analysis techniques. The spectrum of the plasma was recorded with different energy values, SnO2 and ZnO anesthetized at a different ratio (X = 0.2, 0.4 and 0.6) were recorded. Spectral study of this mixing in the air. The results showed electron density and electron temperature increase in zinc oxide: tin oxide alloy targets. It was located that The intensity of the lines increases in different laser peak powers when the laser peak power increases and then decreases when the force continues to increase.
In this work, plasma parameters such as, the electron temperature )Te(, electron density ne, plasma frequency )fp(, Debye length )λD(
and Debye number )ND), have been studied using optical emission spectroscopy technique. The spectrum of plasma with different values of energy, Pb doped CuO at different percentage (X=0.6, 0.7, 0.8) were recorded. The spectroscopic study for these mixing under vacuum with pressure down to P=2.5×10-2 mbar. The results of electron temperature for X=0.6 range (1.072-1.166) eV, for X=0.7 the Te range (1.024-0.855) eV and X=0.8 the Te is (1.033-0.921) eV. Optical properties of CuO:Pb thin films were determined through the optical transmission method using ultraviolet visible spectrophotometer within the ra
The logistic regression model of the most important regression models a non-linear which aim getting estimators have a high of efficiency, taking character more advanced in the process of statistical analysis for being a models appropriate form of Binary Data.
Among the problems that appear as a result of the use of some statistical methods I
... Show MoreRheumatoid arthritis and periodontitis use analogous effector destructive procedures, in that the inflammatory cells and pro-inflammatory cytokines that drive chronic bone erosion in RA and chronic periodontal destruction in Periodontitis are alike. Periodontitis (PD) has appeared as a hazard factor in a number of health situations as rheumatoid arthritis (RA). To determine the effect of anti-tumor necrosis factor alpha biological treatment (methotrexate and Enbrel or infliximab) on periodontal status of patients having rheumatoid arthritis with periodontitis in comparison to those having periodontitis without rheumatoid arthritis and control healthy subjects and to determine the serum levels of anti-cyclic citrullinated peptide (ACCP) in t
... Show MoreBackground: Extracorporeal Shock wave lithotripsy (ESWL) is widely used in treating patients with ureteralstones because it is effective, safe, and noninvasive. Based on factors such as size and the location of stones,there is a significant variation in the overall stone-free rate (SFR).Aim of the study: To evaluate the effect of ureteral wall thickness (UWT), stone attenuation, the time fromfirst attack of pain till first session of ESWL and stone/ rib density on the outcome of SWL in the treatmentof upper ureteral stones (UUS).Patient and methods: A prospective study when 127 patients with radio-opaque UUS ranging from 7 to 20mm and treated by ESWL were included in this study. The effect of (stone/ 12th rib) density by KUB, ureter
... Show MoreThis study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show More