Data generated from modern applications and the internet in healthcare is extensive and rapidly expanding. Therefore, one of the significant success factors for any application is understanding and extracting meaningful information using digital analytics tools. These tools will positively impact the application's performance and handle the challenges that can be faced to create highly consistent, logical, and information-rich summaries. This paper contains three main objectives: First, it provides several analytics methodologies that help to analyze datasets and extract useful information from them as preprocessing steps in any classification model to determine the dataset characteristics. Also, this paper provides a comparative study of several classification algorithms by testing 12 different classifiers using two international datasets to provide an accurate indicator of their efficiency and the future possibility of combining efficient algorithms to achieve better results. Finally, building several CBC datasets for the first time in Iraq helps to detect blood diseases from different hospitals. The outcome of the analysis step is used to help researchers to select the best system structure according to the characteristics of each dataset for more organized and thorough results. Also, according to the test results, four algorithms achieved the best accuracy (Logitboost, Random Forest, XGBoost, Multilayer Perceptron). Then use the Logitboost algorithm that achieved the best accuracy to classify these new datasets. In addition, as future directions, this paper helps to investigate the possibility of combining the algorithms to utilize benefits and overcome their disadvantages.
Nanofiltration (NF) ceramic membrane have found increasing applications particularly in wastewater and water treatment. In order to estimate and optimize the performance of NF membranes, the membrane should be characterized correctly in terms of their basic parameters such as effective pore radius (rp) and equivalent effective thickness as well as effective surface charge ( ), the effective charge density ( ) and Donnan potential ( ). The impact of electrokinetic (zeta) potential on the membrane surface charge density, effective membrane charge density and Donnan potential at two different concentrations of the reference solutions 0.001, 0.01 M sodium chloride at various pH values from 3 to 9, and effective po
... Show MoreThis paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show MoreThe effect of different antibiotics on growth pigment and plasmid curing of Serratia marcescens were studied, S. marcescens was cultured in media containing(16_500)µg/ml of antibiotics, curing mutants unable to produce prodigiosin and lost one plasmid band were obtained of of ampicillin, amoxillin, antibiotics concentrations (64 500) µg/ml metheprim, ultracloxam, azithromycin, cephalexin and erythromycin treated with (350 500) µg/ml of The mutant cells rose- light color and and refampicin revealed S.marcescens inhibited ciprodar and tetracyclin, lincomycin did not lost the plasmid band chlaforan
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
Ping message focused on highlighting the fact commodity trading in Iraq, and increased exposure to world merchandise trade imbalance, which dominate Iraq's foreign trade major commodity is oil, and therefore the inability of Iraq to control financial revenue as a result of the fluctuations in the international market, the shortage of commodity products will lead inevitably to the weakness in the ability of the local market to meet the internal demand and due to the lack of flexible production machine For agricultural, industrial and economic sectors are responding to changes in the domestic or external demand which will open the door to merchandise imports to invade these markets, since the adoption of the Iraq oil exports,
... Show MoreReliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
The majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show More