Objective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using a training data rather than cross validation. The decision tree algorithm J48 is applied to detect and generate the pattern of attributes, which have the real effect on the class value. Furthermore, the experiments are performed with three machine learning algorithms J48 decision tree, simple logistic, and multilayer perceptron using 10-folds cross validation as a test option, and the percentage of correctly classified instances as a measure to determine the best one from them. As well as, this investigation used the iteration control to check the accuracy gained from the three mentioned above algorithms. Hence, it explores whether the error ratio is decreasing after several iterations of algorithm execution or not. Conclusion It is noticed that the error ratio of classified instances are decreasing after 5-10 iterations, exactly in the case of multilayer perceptron algorithm rather than simple logistic, and decision tree algorithms. This study realized that the TPS_pre is the most common effective attribute among three main classes of examined dataset. This attribute highly indicates the BC inflammation.
In the present study, five derivatives have been designed to be synthesized as possible mutual prodrugs for 5-Fluorouracil (5-FU) and non steroidal anti-inflammatory drugs (NSAIDs) to selectively deliver the drugs into the cancer cells. The synthesis of the target compounds were accomplished following multistep reaction procedures, the chemical reaction followed up and the purity of the products were checked by TLC. The structure of the final compounds and their intermediates were confirmed by their melting points, infrared spectroscopy and elemental microanalysis, the hydrolysis of compound III was studied using HPLC technique. According to the results mentioned above, compounds (I−V) can be good candidates as possible mutual prod
... Show MoreIn the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.
One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.
In this paper the amplitude and the phase shift of the received signal were calculated according to the orig
... Show MoreBreast mass is by far the most important clinical problem that concerns the breast today. This study was carried out to evaluate diode laser as a cutting tool in breast mass excision and as a hemostatic tool for coagulation during surgery. Using 810 nm diode laser with optical fiber 600μm in diameter of conical tip, udder (cow's breast) tissue, and three female patients (mean age of 35.5 y with clinically palpable breast mass) had been used in this study. The patients were followed up regularly postoperatively. In preliminary work on udder tissue, the power needed for cutting and excision was 15W (power density= 5.3 kW/cm2). The time consumed for excision of a piece of udder tissue, 40×10×3 mm in dimensions was 5 min. The depth range
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIraq faces significant economic challenges, owing in part to its reliance on oil revenue and the country's overburdened public sector. The supremacy of State-Owned Enterprises (SOEs), obstructive rules, a lack of access to finance, a shortage of skilled labor, and inadequate infrastructure all impede private sector growth. This research relied mainly on information from global development organizations, most markedly the World Bank, as well as policy documents, and it discovered a scarcity of pertinent educational writings. The following are the key findings of this research: Recent economic growth has not resulted in poverty reduction; the stretched history of war and insecurity in Iraq has hampered progress and development; the private se
... Show MoreAbstract Depending on their protective properties against different cases of Colorectal Cancer (CRC), vitamins C, D, and E are the main focus of this research. CRC is one of the global public health concerns. 30 healthy individuals provided serum samples, whereas the group of CRC patients was divided into three, totaling 90 individuals. Group I consisted of 30 newly diagnosed cases of CRC. Group II 30 consisted of consisted of 30 CRC patients who were administered three cycles of chemotherapy. Group III consisted of 30 diagnosed CRC patients who also have non-alcoholic fatty liver disease (NAFLD). The concentrations and groups of vitamins C, D, and E were evaluated using ELISA. The levels of Vitamin C were significantly lower (p &l
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show More