Introduction/Aim. Roughly six percent of all malignancies diagnosed in children are malignant bone tumors. They have a dramatic effect on psychological status of children and their families. The aim of the study was to analyze the clinico-pathological features of bone tumors in Iraqi children and to assess response to treatment, outcome, and survival. Patients and methods. Over an eleven-year period, a retrospective study was done for children with bone tumors conducted on patients data that included a battery of pre-treatment investigations including a complete blood count, serum electrolyte, hepatic, and renal profile, bone marrow aspirate and biopsy, fine-needle aspiration, and imaging studies. Results. Data of 41 children with b
... Show MoreIf we go beyond the technical aspects of the Web 2.0, and we focus specifically on its interactive characteristics, we may say it represents not only a fundamental shift in the structure of the press institutions and its practices but also a shift in the relationships that existed, previously, between the press and the audience. Web 2.0 has enabled the newspapers to renovate their representations and practices of the profession and opens to the new horizons either in terms of readership or advertising revenues. Parallel to that it also has empowered the user to transcend the passivity he has always been confined in and has become a more active participant in the creation and generation of media contents even though this practice is somew
... Show MoreData-driven models perform poorly on part-of-speech tagging problems with the square Hmong language, a low-resource corpus. This paper designs a weight evaluation function to reduce the influence of unknown words. It proposes an improved harmony search algorithm utilizing the roulette and local evaluation strategies for handling the square Hmong part-of-speech tagging problem. The experiment shows that the average accuracy of the proposed model is 6%, 8% more than HMM and BiLSTM-CRF models, respectively. Meanwhile, the average F1 of the proposed model is also 6%, 3% more than HMM and BiLSTM-CRF models, respectively.
Background: Salivary tumors are uncommon, being of low incidence worldwide. This study aimed to assess cases collected in this series of salivary gland tumors in regard to histopathological typing, in relation to age, site and gender. Materials and methods: This is a retrospective study; cases were collected from public and private laboratories. A total number of 171 cases were collected. The slides were reviewed and reclassified for histopathological typing according to WHO classification 2005. Results: Benign tumors were more common than malignant tumors. The most common histological type was benign mixed tumor, followed by Warthin’s tumor. The most common malignant tumor was adenoid cystic carcinoma. One hundred twenty three cases ou
... Show MoreThe study of the " Speech act " in grammatical codes reveals great efforts in the study of the elements of linguistic communication contained in their efforts, and is part of the study of the linguistics of heritage, and the research has been designed to identify the verbal act in the blog of Ibn al-Khabaz (guiding the shine) by studying its sections comprehensively; To the spirit of grammatical discourse as well as the combination of the concept of the semantic act already verbal according to Searle, and its response in the form of indirect verbal acts more than direct acts, as well as the pure formulas of the opinions of the violators in the speech of Ibn al-Khabaz other than the proven verbal formulas Approval and approval, the class
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin
... Show MoreThe purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.
The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.
The serum protein test includes measurement of the level of total protein(albumin, globulin). Fetuin-A is a blood protein made in liver. It can inhibit insulin receptor, enhance insulin sensitivity and make the individuals more likely to develop type 2 diabetes, then disorder in lipid profile (Total cholesterol(TC), low density lipoprotein cholesterol (LDL-c), high density lipoprotein cholesterol (HDL-c), Triglyceride(TG) and very low density lipoprotein cholesterol (VLDL-c) . To evaluate Fetuin-A, total protein, albumin, globulin, HbAlc and lipid profile in 200 adult and elderly Iraqi patients with type 2 Diabetes Mellitus were taken and compare them with 200 subjects as a healthy control. The laboratory analysis(for patients and
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show More