Background: Little is known about asymmetry of children's dental arches, the purpose of this study was to verify the presence of asymmetry of dental arches among Iraqi children in the mixed dentition stage. Materials and methods: The sample included 52 pairs of dental casts, 27 pairs belong to males and 25 pairs for females. Three linear distances were utilized on each side on the dental arch: Incisal-canine distance, canine-molar distance and incisal-molar distance, which represent the dental arch segmental measurements using the digital sliding calipers, which is accurate up to 0.02 mm. Results: No significant sides' differences with high correlation coefficient were found between the right and left incisal-canine, canine-molar and in
... Show MoreThe rising temperatures are the most significant aspect in the period of climate variability. In this study PRECIS model data and observed data are used for assessing the temperature change scenarios of Sindh province during the first half of the present century. Observed data from various meteorological stations of Sindh are the primary source for temperature change detection. The current scenario (1961–1990) and future one (2010-2050) are acted by the PRECIS Regional Climate Model at a spatial resolution of 25 * 25 km. Regional Climate Model (RCM) can yield reasonably suitable projections to be used in the climate - scenario. The main objective of the study is to prepare maps. The simulated temperature as obtained from climate model-
... Show MoreThere are growing concerns over the possibility of transfer genetically modified
sequences from genetically modified feed component (GM feed) to animals and
their products, moreover, affect these sequences on animal and human health. This
study was implemented to detect P35S in modified feed by using PCR technique by
detecting presence P35S promoter, which responsible for the regulation of gene
expression for most of the transgenic genes. Thirty eight feed samples were
collected from different sources of Baghdad markets, which have been used for
feeding livestock, comprise 21 coarse mixes feed, 13 pelleted feed, and 4 expanded
feed. Genomic DNA was extracted by using two methods, CTAB method and
Wizard kit. In
There are growing concerns over the possibility of transfer genetically modified sequences from genetically modified feed component (GM feed) to animals and their products, moreover, affect these sequences on animal and human health. This study was implemented to detect P35S in modified feed by using PCR technique by detecting presence P35S promoter, which responsible for the regulation of gene expression for most of the transgenic genes. Thirty eight feed samples were collected from different sources of Baghdad markets, which have been used for feeding livestock, comprise 21 coarse mixes feed, 13 pelleted feed, and 4 expanded feed. Genomic DNA was extracted by using two methods, CTAB method and Wizard kit. In order to verify the presenc
... Show MoreRecent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app
... Show MoreThis paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreThe growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication
... Show MoreImaging by Ultrasound (US) is an accurate and useful modality for the assessment of gestational age (GA), estimation fetal weight, and monitoring the fetal growth during pregnancy, is a routine part of prenatal care, and that can greatly impact obstetric management. Estimation of GA is important in obstetric care, making appropriate management decisions requires accurate appraisal of GA. Accurate GA estimation may assist obstetricians in appropriately counseling women who are at risk of a preterm delivery about likely neonatal outcomes, and it is essential in the evaluation of the fetal growth and detection of intrauterine growth restriction. There are many formulas are used to estimate fetal GA in the world, but it's not specify fo
... Show More