Data generated from modern applications and the internet in healthcare is extensive and rapidly expanding. Therefore, one of the significant success factors for any application is understanding and extracting meaningful information using digital analytics tools. These tools will positively impact the application's performance and handle the challenges that can be faced to create highly consistent, logical, and information-rich summaries. This paper contains three main objectives: First, it provides several analytics methodologies that help to analyze datasets and extract useful information from them as preprocessing steps in any classification model to determine the dataset characteristics. Also, this paper provides a comparative st
... Show MorePeriodontitis is a chronic inflammatory disease resulted from aggravated immune response to a dysbiotic subgingival microbiota of a susceptible host. Consequences of periodontitis are not only limited to the devastating effect on the oral cavity but extends to affect general health of the individual and also exerts economic burdens on the health systems worldwide. Despite these serious outcomes of periodontitis; however, they are avoidable by early diagnosis with proper preventive measures or non-invasive interventions at earlier stages of the disease. Clinically, diagnosis of periodontitis could be overlooked due to certain limitations of the conventional diagnostic methods such as periodontal charting and radiographs. Utilization of re
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreA collection of pictures of traditional Kurdish women's national clothing and contemporary clothing was collected. A visit was also made to the city of Sulaymaniyah and the city of Halabja to find out the foundations of traditional clothing for the Kurdish regions and the impact of contemporary fashion on traditional dress. Which represents the culture and regionalism and reflects the picturesque nature of northern Iraq, and in order to complete the study, the parametric measurements of the clothes were analyzed and the graphs of the dress and its accessories were re-drawn to understand and make a comparison between them to study the clear influences and changes and examine the possibility of benefiting from them in sewing contemporary f
... Show MoreThe calibration of a low-speed wind tunnel (LSWT) test section had been made in the present work. The tunnel was designed and constructed at the Aerodynamics Lab. in the Mechanical Engineering Department/University of Baghdad. The test section design speed is 70 m/s. Frictional loses and uniformity of the flow inside the test section had been tested and calibrated based on the British standards for flow inside ducts and conduits. Pitot-static tube, boundary layer Pitot tube were the main instruments which were used in the present work to measure the flow characteristics with emphasize on the velocity uniformity and boundary layer growth along the walls of the test section. It is found that the maximum calibrated velocity for empty test s
... Show MoreThe research aims to monitor and analyze the visual and symbolic features, derived from the Omani heritage, and inspired by the concept of local identity, for a selection of contemporary Omani graphic art works, which represent a mixed, multi-category of research sample, comprising three levels: the works of professional Omani artists, and the works of young artists and specialized students, as well as the work of a number of active academics in the field of graphic theorizing and teaching. The sample is also divided - in terms of technical classification - into a category of works executed using traditional engraving and printing media, and a category of works executed using modern and digital graphic printing media.
Through the da
This work was conducted to study the extraction of pelletierine sulphate from Punica granatum L. roots by liquid membrane techniques. Pelletierine sulphate is used widely in medicine. The general behavior of extraction process indicates that pelletierine conversion increased with increasing the number of stages and the discs rotation speed but high rotation speed was not favored because of the increased risk of droplet formation during the operation. The pH of feed and acceptor solution was also important. The results exhibit that the highest pelletierine conversion was obtained when using two stages, (10 rpm) discs speed of stainless steel discs, (pH=9.5) of feed solution and (pH=2) of acceptor solution in n-decane. Assuming the existen
... Show MoreExciton model describes the excitation of particles in pre-equilibrium region of nuclear reaction by exciton. In pre-equilibrium region there is a small probability for occurring emission and the number of excitons be the probability of the emission of it possible more is called most probable exciton number MPEN. In this paper the MPEN formula was derived for protons and neutrons separately and so MPEN formula derived with taking into account the non equidistant spacing between the energy states. The MPEN was studied with the mass number where it is noticed the MPEN increases with increasing the mass number. Also, MPEN studied for different isotopes of Al, the MPEN increases with increasing mass number of isotopes. MPEN for neutron is co
... Show MoreThe antibacterial effect of (Eruca sativa) extract was evaluated by an in vitro study testing the growth of various Gram-Positive and Gram-Negative bacteria . The bactericidal activity of this extract was analyzed by serial dilution in tubes. This study,found that Gram-Negative and Gram-Positive bacteria susceptible to very low eruca concentrations. On the other hand, Gram-positive bacteria were more susceptible than Gram-negative bacteria, the minimal bactericidal concentration of Gram-positive bacteria was 5 mg ml-1 but minimal bactericidal concentration of Gram-negative bacteria was 10 mg ml-1 that mean duble inhibation concentration of Gram-positive bacteria . this study suggest that Eruca sativa leaves have inhibation effect on Gra
... Show More