Problem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a CT lung cancer dataset consisting of 1000 images and four different classes. The data augmentation process is applied to prevent overfitting, increase the size of the data, and enhance the training process. Score-level fusion and ensemble learning are also used to get the best performance and solve the low accuracy problem. All models were evaluated using accuracy, precision, recall, and the F1-score. Results: Experiments show the high performance of the ensemble model with 99.44% accuracy, which is better than all of the current state-of-the art methodologies. Conclusion: The current study's findings demonstrate the high accuracy and robustness of the proposed ensemble transfer deep learning using various transfer learning models
This research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo
... Show MoreThe elections of the Council of Representatives in Iraq are one of the manifestations of political participation, which makes it attracts the attention of researchers. Where Iraq witnessed in 2005 important political events in the Iraqi arena, a pluralist parliamentary elections or elections in Iraq by direct free election on January 30, the first almost half a century ago. On November 15 of the same year, Iraq adopted a permanent constitution for the country through a popular referendum.
A multivariate multisite hydrological data forecasting model was derived and checked using a case study. The philosophy is to use simultaneously the cross-variable correlations, cross-site correlations and the time lag correlations. The case study is of two variables, three sites, the variables are the monthly rainfall and evaporation; the sites are Sulaimania, Dokan, and Darbandikhan.. The model form is similar to the first order auto regressive model, but in matrices form. A matrix for the different relative correlations mentioned above and another for their relative residuals were derived and used as the model parameters. A mathematical filter was used for both matrices to obtain the elements. The application of this model indicates i
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
This research aims to find out the impact on the receptive style according to the specimen in the collection of material Brawner and retention as students at the Arabic Department at the Faculty of Education for Girls. For confirmation from the goal of the research, the researcher placed two hypotheses, one to two for collections and one for pods. - chosen as the College of Education for Girls / Department of Arabic language for the application of choice Intentionally search experience for reasons of researcher he is teaching them and thus ensures cooperation of teachers and students in them. - selected Division (b) of the fourth grade students of the Arabic language section at random to represent the experimental group, while the Division
... Show MoreA comparison between the resistance capacity of a single pile excited by two opposite rotary machines embedded in dry and saturated sandy soil was considered experimentally. A small-scale physical model was manufactured to accomplish the experimental work in the laboratory. The physical model consists of: two small motors supplied with eccentric mass 0·012 kg and eccentric distance 20 mm representing the two opposite rotary machines, an aluminum shaft with 20 mm in diameter as the pile, and a steel plate with dimensions of (160 × 160 × 20 mm) as a pile cap. The experimental work was achieved taking the following parameters into consideration, pile embedment depth ratio (L/d; length to diameter) and operating freq
... Show More