The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
The study has tackled three important variables on the strategic and organizational level, that are : (Administrative skill, strategic Entrepreneurship and organizational flexibility). Through the statistical analysis is, the research hers have sought to identify the relation among them. The study has been applied on a sample of (44) private banks in Iraq. A questionnaire, which has been designed according to a number of international standards, has been used. It's made of (29) items that cover the three variables to test their hypotheses. A number of statistical tools have been used A number of conclusion have been reached and recommendations have also been suggested.
The new Hexadentate complexes type [M(H3L3)]K were prepared from the condensation reaction of Diphenylmonoxime and KOH with (Mn(II), Co(II), Ni(II), Cu(II), Zn(II), and Hg(II)) in methanol with 3:1 ligand : metal ratio to give a series of new complexes of the general formula [M(H3L3)]K (where: M(II) = Mn ,Co ,N ,Cu ,Zn and Hg).All compounds have been Characterized by spectroscopic methods [I.R, U.v-Vis, atomic absorption and microanalysis (C.H.N) along with conductivity measurements. The stability constant K and Gibbs free energy ∆G were calculated for [Co (H3L3)] K, [Ni (H3L3)] K and [Cu (H3L3)] K and complexes using spectrophotometer method. The obtained values indicate that these complexes stable in their solution. From the above data
... Show MoreBackground: The objective of this in vitro study was to evaluate the vertical marginal fit of crowns fabricated with ZrO2 CAD/CAM, before and after porcelain firing cycles and after glaze cycles. Materials and Methods: An acrylic resin model of a left maxillary first molar was prepared and duplicated to have Nickel-Chromium master die. Ten die stone dies were sent to the CAD/CAM (Amann Girrbach) for crowns fabrication. Marginal gaps along vertical planes were measured at four indentations at the (mid mesial, mid distal, mid buccal, mid palatal) before (Time 0) and after porcelain firing cycles (Time 1) and after glaze cycles (Time 2) using a light microscope at a magnification of ×100. One way ANOVA LSD tests were performed to determine wh
... Show MoreAbstract Background: Acute myeloid leukemia (AML) results from sequential genetic alterations in a normal hematopoietic stem cell or its progenitors giving rise to an autonomous clone that dominates the bone marrow leading to marrow failure. MicroRNAs are short non-coding nucleic acid sequences that regulate post-transcriptional gene expression by base-pairing with their target mRNAs. MiRNAs can be secreted into extracellular fluids and carried to target cells by vesicles or bound to proteins. Intracellular and circulating miRNAs are believed to be useful markers in the diagnosis, prognosis, and treatment of various cancers. Practically, circulating miRNAs are more stable at room temperatures and extreme conditions. Purpose: This study aim
... Show MoreThe study aimed to compare the expression of miR-126-3p and miR-423-5p in patients and normal subjects, and correlate their expression with response to induction therapy. Circulating miR-126-3p and miR-423-5p were measured in the plasma of 43 adult AML patients and 35 age- and sex-matched controls by real time PCR. The foldchange in differential expression for each gene was calculated using the comparative cycle threshold (CT) method (also known as the 2−CT method). For statistical purposes, the fold change was calculated using DDCT (or 2–∆∆Ct) method to find the relative expression of miRNAs. The expression fold change of miR-126-3p was 1.73-fold increase in patients than controls (p= 0.010). The expression fold change of miR-423-5
... Show MoreBackground: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biolo
... Show MoreBackground: Dental caries is one of the most significant problems in world health care. Restoring carious primary teeth is one of the major treatment goals for Children, and the light activated resin restoration materials like composite, resin-modified glass ionomer and polyacid-modified which was introduced in dentistry in 1970, widely used in clinical dentistry but its application increased dramatically in recent years because of its biocompatibility, color matching, good adhesive properties of its resemblance in physical and mechanical aspects to tooth. The aim of this study: To evaluate the microleakage of Polyacid-Modified Composite resin Compared to Flowable Hybrid Composite and Resin-Modified Glass ionomer cement. Materials and me
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreBootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show MoreFresh water resources in terms of water quality is a crucial issue worldwide. In Egypt, the Nile River is the main source of fresh water in the country and monitoring its water quality is a major task on governments and research levels. In the present case study, the physical, chemical and algal distribution in Nile River was monitored over two seasons (winter and summer) in 2019. The aims of the study were to check the seasonal variation among the different water parameters and also to check the correlations between those parameters. Water samples were collected from the Nile in Cairo governorate in EGYPT. The different physiochemical and microbiological properties in water samples were assessed. The studied parameters were included: te
... Show More