Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using a training data rather than cross validation. The decision tree algorithm J48 is applied to detect and generate the pattern of attributes, which have the real effect on the class value. Furthermore, the experiments are performed with three machine learning algorithms J48 decision tree, simple logistic, and multilayer perceptron using 10-folds cross validation as a test option, and the percentage of correctly classified instances as a measure to determine the best one from them. As well as, this investigation used the iteration control to check the accuracy gained from the three mentioned above algorithms. Hence, it explores whether the error ratio is decreasing after several iterations of algorithm execution or not. Conclusion It is noticed that the error ratio of classified instances are decreasing after 5-10 iterations, exactly in the case of multilayer perceptron algorithm rather than simple logistic, and decision tree algorithms. This study realized that the TPS_pre is the most common effective attribute among three main classes of examined dataset. This attribute highly indicates the BC inflammation.
Modeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreIn the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.
One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.
In this paper the amplitude and the phase shift of the received signal were calculated according to the orig
... Show MoreBreast mass is by far the most important clinical problem that concerns the breast today. This study was carried out to evaluate diode laser as a cutting tool in breast mass excision and as a hemostatic tool for coagulation during surgery. Using 810 nm diode laser with optical fiber 600μm in diameter of conical tip, udder (cow's breast) tissue, and three female patients (mean age of 35.5 y with clinically palpable breast mass) had been used in this study. The patients were followed up regularly postoperatively. In preliminary work on udder tissue, the power needed for cutting and excision was 15W (power density= 5.3 kW/cm2). The time consumed for excision of a piece of udder tissue, 40×10×3 mm in dimensions was 5 min. The depth range
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThis study was aimed to examined effect of Januvia treatment on methionine synthases Meth and cystathionine B- synthase (CBS) in Iraqi patients type2 without treated and another group who taken Januvia treated in addition to diabetic patients with complication without treated with Januvia Also, to found the relationship between these parameters with BMI, FBS, HbA1C and Insulin levels. Firstly, the blood sampling date for this research between December and February 2019 - 2020. Blood sampling was withdrawn from 8:00 to 10:00 in the case of fasting of all substances . five milliliters of venous blood were collected by means of an antecubital venipuncture divided into two parts, one of which (2ml) was put in a tube containing anticoagulant fac
... Show MoreBackground: Despite the fact that asthma is a long-term disease that may be treated, many people are unable to control their symptoms due to a lack of knowledge about their condition. The study's purpose was to find out if a pharmacist intervention improved asthma management because of this.
Objective: this study designed to assess the effect of pharmaceutical care on pulmonary functions test.
Method: The study was completed in three months. The patients who were enrolled were divided into two groups: Group 1 consists of 23 asthma patients who were randomly assigned to receive conventional therapy for chronic bronchial asthma based on disease stage and se
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreOvarian cancer has a high mortality and delayed diagnosis. Several immunological alterations take place during ovarian carcinogenesis, and can be of value in the surveillance of the diseases. This research was conducted to evaluate serum immunoglobulin levels in women with ovarian cancer and to assess their role in disease process. The present study is composed of 85 women (mean age = 62.03±12.4 yrs) with clinically and pathologically confirmed ovarian cancer and 65 healthy females as a control group (mean age = 61±12.1 yrs). ELISA test was achieved for the determination of serum [IgG, IgA, IgM]. The findings of current study illustrated significant (P=0.001) increase in serum IgG, IgA, and IgM levels as compared to co
... Show More