Breast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased or not.
Poly-ether-ether-ketone (PEEK) was introduced in dentistry as an alternative to metal alloys.
To assess the effectiveness of PEEK-fixed retainers in preserving the stability of mandibular anterior and participant satisfaction as compared to the Dead-soft coaxial fixed retainer (DSC).
A single-centre, two-arm parallel groups
Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Science, technology and many other fields are use clustering algorithm widely for many applications, this paper presents a new hybrid algorithm called KDBSCAN that work on improving k-mean algorithm and solve two of its
problems, the first problem is number of cluster, when it`s must be entered by user, this problem solved by using DBSCAN algorithm for estimating number of cluster, and the second problem is randomly initial centroid problem that has been dealt with by choosing the centroid in steady method and removing randomly choosing for a better results, this work used DUC 2002 dataset to obtain the results of KDBSCAN algorithm, it`s work in many application fields such as electronics libraries,
Los nombres propios nombran a un ser o a un objeto, distinguiéndolo de los demás seres de su misma clase, se escriben siempre con letra mayúscula a principio de palabra. Los lingüistas hacen mayor hincapié en las divergencias de referencia, entre nombres propios y nombres comunes. Así, suele decirse que el sustantivo propio no tiene como referente ningún concepto. El asunto de la traducción de los nombres propios parecería una cuestión de gusto personal del traductor pero vemos también que en algunas épocas es más frecuente traducirlos, y en otras, por el contrario, se prefiere dejar esos nombres en su forma original, tal vez con algunas adaptaciones ortográficas. Parecería entonces cuestión de modas. Pero, eviden
... Show MoreBackground: Dorsal plication on each side of the penis at the 2 and 10-o’clock positions had been a mainstay for correction of ventral penile curvature. However, because only the 12-o’clock position proved to be a nerve-free zone, dorsal plication at the 12-o’clock position can be advocated.
Objectives: To evaluate tunica albuginea plication with and without neurovascular bundle mobilization in patients with ventral penile curvature. Type of the study: A prospective study.
Methods: A 34 patients with a mean age of (4.8 ± 0.54) years, Who still
Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreThe reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal
... Show MoreThe diseases presence in various species of fruits are the crucial parameter of economic composition and degradation of the cultivation industry around the world. The proposed pear fruit disease identification neural network (PFDINN) frame-work to identify three types of pear diseases was presented in this work. The major phases of the presented frame-work were as the following: (1) the infected area in the pear fruit was detected by using the algorithm of K-means clustering. (2) hybrid statistical features were computed over the segmented pear image and combined to form one descriptor. (3) Feed forward neural network (FFNN), which depends on three learning algorithms of back propagation (BP) training, namely Sca
... Show MoreIn this paper, we introduce a type of modules, namely S-K-nonsingular modules, which is a generalization of K-nonsingular modules. A comprehensive study of these classes of modules is given.