Data generated from modern applications and the internet in healthcare is extensive and rapidly expanding. Therefore, one of the significant success factors for any application is understanding and extracting meaningful information using digital analytics tools. These tools will positively impact the application's performance and handle the challenges that can be faced to create highly consistent, logical, and information-rich summaries. This paper contains three main objectives: First, it provides several analytics methodologies that help to analyze datasets and extract useful information from them as preprocessing steps in any classification model to determine the dataset characteristics. Also, this paper provides a comparative study of several classification algorithms by testing 12 different classifiers using two international datasets to provide an accurate indicator of their efficiency and the future possibility of combining efficient algorithms to achieve better results. Finally, building several CBC datasets for the first time in Iraq helps to detect blood diseases from different hospitals. The outcome of the analysis step is used to help researchers to select the best system structure according to the characteristics of each dataset for more organized and thorough results. Also, according to the test results, four algorithms achieved the best accuracy (Logitboost, Random Forest, XGBoost, Multilayer Perceptron). Then use the Logitboost algorithm that achieved the best accuracy to classify these new datasets. In addition, as future directions, this paper helps to investigate the possibility of combining the algorithms to utilize benefits and overcome their disadvantages.
In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
Emotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018). To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)
... Show MoreObjectives: To identify the effectiveness program on nurse- midwife practice concerning performed
cardiotocography to pregnant women and to find out the relationship between nurse- midwife practice and
certain studied variables.
Methodology: A quasi-experimental design (pretest-post test approach) was conducted at three sector AlRussafa
directorate, AL- Karckh directorate and Medical City Directorate from the period of March, 26th 2014
to August, 30th 2015. A non-probability sample consisted of (130) nurse -midwives were selected and divided
into two groups (65) nurses-midwives (case group) who exposed to the educational program and (65 ) nursesmidwives
who didn't expose to the program considered as control group . D
Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates
... Show MoreBackground: One of the significant public health problems is the traumatic dental injury to the anterior teeth, it has a great impact on children’s daily. Physical and psychological disturbance, pain and other negative impacts, such as tendency to avoid laughing or smiling may be associated with traumatic dental injuries, that may affect the social relationships. To determine the occurrence of traumatic dental injuries in relation to quality of life, this study was established among children of primary schools. Material and Methods: A cross-sectional study was conducted among private (574) and governmental (1026) primary school children in Baghdad city. Dental trauma was assessed according to Ellis and Davey classification in1970
... Show MoreThe researcher attempts to examine Barman model in acquiring the historical concepts among fourth-grade students at literary classrooms. To this end, the researcher held the null hypothesis, there is no significant difference between the experimental groups who was taught based on Barman model and the control group that taught based on the traditional method in acquiring the historical concepts on the post-test. To testify the effectiveness of Barman model, the researcher administered a questionnaire included (60) items on bunch of female-students who were selected from al-khamaeal preparatory school in al-hurriyah district in Baghdad. The author utilized different statistical tools to analyze the collected data. &
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreIn the present work, heterojunction diode detectors will be prepared using germanium wafers as a substrate material and 200 nm tin sulfide thickness will be evaporated by using thermal evaporation method as thin film on the substrate. Nd:YAG laser (λ=532 nm) with different energy densities (5.66 J/cm2 and 11.32 J/cm2) is used to diffuse the SnS inside the surface of the germanium samples with 10 laser shots in different environments (vacuum and distilled water). I-V characteristics in the dark illumination, C-V characteristics, transmission measurements, spectral responsivity and quantum efficiency were investigated at 300K. The C-V measurements have shown that the heterojunction were of abrupt type and the maximum value of build-in pot
... Show MoreThe aim of the present study is to evaluate the effectiveness of using Art as therapy to reduce the symptoms of Attention Deficit Hyper Activity Disorder (ADHD), in primary school children.
A clinical approach was used to test the validity of the hypothesis of our study, conducted on two second and fourth-year primary school pupils from Algiers, aged 7 and 9 years respectively.
In addition to the clinical observation and interview, we made use of the "Conners" scale for a (pre and post intervention) ADHD assessment, consisting of a combination of Art media in the form of mosaic works on purposely prepared panels. After 10 therapy sessions, results revealed the effectiveness of Art therapy in reducing ADHD in primary education