Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN model are identified as the ferritin and a gender variable. The higher results precision was attained by the multilayer perceptron (MLP) networks when we applied the explanatory variables as the inputs with one hidden layer, which covers 3 neurons, as the planned many hidden layers are with one output of the fitting NN model which is use in stages of training and validation beside the actual data. We used a portion of the actual data to verify the behaviour of the developed models, we find that only one observation is false prediction value. This mean that the estimation model has significant parameters to forecast the type of Covid cases (Covid or no Covid) .
Background: The human face has its special characteristics. It may be categorized into essentially three kinds in horizontal and vertical directions: short or brachyfacial, medium or mesofacial and long or dolichofacial. The aim of this study was to describe several orofacial indices and proportions of adults, according to gender in Iraqi subjects by using cone beam computed tomography . materials and methods: This prospective study included 100 Iraqi patients (males and females) ranging from 20 to 40 years. All subjects attended the Oral and Maxillofacial Radiology Department of Health Specialist Center for Dentistry in AL Sadr city in Baghdad taking cone beam computed tomography scan for different diagnostic purposes from October 2016 to
... Show MoreThe adsorption of Pb(II) ions onto bentonite and activated carbon was investigated. The effects of pH, initial adsorbent dosage, contact time and temperature were studied in batch experiments. The maximum adsorption capacities for bentonite and activated carbon were 0.0364 and 0.015 mg/mg, respectively. Thermodynamic parameters such as Gibbs free energy change, Enthalpy change and Entropy change have been calculated. These thermodynamic parameters indicated that the adsorption process was thermodynamically spontaneous under natural conditions and the adsorption was endothermic in nature. Experimental data were also tested in terms of adsorption kinetics, the results showed that the adsorption processes followed well pseudo second- order
... Show MoreThe aim of this research is to identify the effect of Webinar technique on digital culture in the College of Education for pure sciences at Ibin Haitham, University of Baghdad. The research samples consisted of (68) male and female students from the Chemistry Department who are following classes during the (2019- 2020) academic year. The samples represent (42%) of the total number of (162) students split into control and experimental groups. For this purpose, the scientific contents for testing were determined. The experimental part is based on analysis of the results from experiments in (preliminary standard solutions, refractive index, Beer-Lambert law). To achieve the aim of the research in testing the measure of student's digital cultur
... Show MoreThis research involves design and simulation of GaussianFSK transmitter in UHF band using direct modulation of ΣΔ fractional-N synthesizer with the following specifications:
Frequency range (869.9– 900.4) MHz, data rate 150kbps, channel spacing (500 kHz), Switching time 1 µs, & phase noise @10 kHz = -85dBc.
New circuit techniques have been sought to allow increased integration of radio transmitters and receivers, along with new radio architectures that take advantage of such techniques. Characteristics such as low power operation, small size, and low cost have become the dominant design criteria by which these systems are judged.
A direct modulation by ΣΔ fractional-N synthesizer is proposed
... Show More<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThis study is intended to examine the concept of transcultural identity in the travel book The Global Soul: Jet Lag, Shopping Malls, and the Search for Home by (Iyer, 2001). Jeffries’ model of critical stylistics (2010) (henceforth, CS) has been selected to analyze the book. To be more specific, Negation is selected to analyze the concept under study. As such, the study aims at finding out how Negation is used to portray ideological meanings representing the concept of transcultural identity in one non-fictional travel book; and finding out the ideologies related to the concept analyzed. The analysis of the data shows that Negation is a suitable analytical tool to reach the ideational meaning of the text towards the concept of tra
... Show More