Surface water samples from different locations within Tigris River's boundaries in Baghdad city have been analyzed for drinking purposes. Correlation coefficients among different parameters were determined. An attempt has been made to develop linear regression equations to predict the concentration of water quality constituents having significant correlation coefficients with electrical conductivity (EC). This study aims to find five regression models produced and validated using electrical conductivity as a predictor to predict total hardness (TH), calcium (Ca), chloride (Cl), sulfate (SO4), and total dissolved solids (TDS). The five models showed good/excellent prediction ability of the parameters mentioned
... Show MoreObjective: Aimed to asses the role of PT estimation in early diagnosis and predicting the extent and the outcome of head injury with ICerH and/ or Contusion
Method :PT was measured by Digiclot 818
Group –1: One hundred consecutive head injured patients admitted at Neurosurgical and Al Ramadi teaching hospitals were initially estimated for prothrombin time and subsequently scanned
Group-2 : Two hundred twenty five consecutive non scanned head injured patients admitted to Neurosurgical and Al Ramadi teaching hospitals were estimated with prothrombin time at the time of insult and subsequently for the next two weeks Al – Kindy Col Med J 2012; Vol. 8 No. 1 P: 54
Clinical and neurological evaluation (GCS) score in addition to
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreBACKGROUND : Bifurcational coronary lesions are
frequent and amounts to almost one fifth of routine
practice concerning up to 15 – 20 % of cases .
Revascularization by percutaneous coronary
intervention ( PCI ), of bifurcational lesion has
become easier by stenting yet it remains a frequent
challenge.
OBJECTIVE : To evaluate the success and hospital
complications of two most frequent technique of stent
deployment in bifurcational PCI.
METHODS : We prospectively analysed the data of
140 consecutive patients with bifurcational PCI at
Ibn_Al-Bitar Hospital for cardiac surgery for the
period from July 2008 to July 2009 .
Depending on whether the side branch was stented or
not, the patient has fa
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreObjective: The aim of this work was to detect terpenes other than boswellic acid derivatives in olibanum of Boswellia Serrata found in Iraq. Methods: The olibanum of Boswellia Serrata was macerated in methanol for one day, then filtration. Filter at was concentrated till reddish brown syrupy residue was gained, (3%) potassium hydroxide was added till basification. This basic solution was stirred continuously until a uniform emulsion was formed, then extracted with chloroform in a separatory funnel; the chloroform fraction was analyzed by GC /MS spectrometry. Results: GC /MS analysis reveal the presence of terpenes and non-terpenes constituents. Conclusion: Most of the detected terpenes were sesquiterpenes and the least one was di-terpenes.