Tumours in pets occur naturally and are common in dogs as they are in humans. Tumours of the alimentary system have been reported in animals, although less frequently. Food patterns and specific diet components could have a big role in such tumour occurrence. Therefore, the aim of this study was to investigate the clinical signs and inspect the neoplasm lesions of the gastrointestinal (GI) tract grossly and histopathologically in dogs in Baghdad, Iraq, and to see whether pet diets had any tumourigenic effect. Throughout two years sixteen dogs were referred to Teaching Animal Hospital and private clinics at Baghdad city with masses in (GI) tract. Males and large size breeds were more likely to be affected with GI tumours. Half of the cases aged 5-10 years and belonged to German Shepherd, while the other half involved the other breeds (i.e. Belgian Malinois, Labrador, Pointer GSP and Terrier) equally. Biopsies were taken from the tumour tissues for histological examination. Clinically, the animals presented general signs of digestive system abnormalities, like difficult defecating, bloody stool, lethargy and weight loss. Grossly, the tumours varied in their sizes from <3 cm to >5 cm in diameter, and the most frequent site of occurrence (10 out of 16 cases) was in the large intestine. Histologically, most tumours reported were malignant, and included adenocarcinomas (6/16) followed by leiomyosarcoma (4/16), adding to 2/16 belonged to carcinoid tumour. However, lipoma and viral papilloma (4/16) were also registered as benign tumours. In conclusion, tumours of canine digestive system do exist but rare. Healthy nutrition of dogs may prevent this type of cancer by consuming enough amount of raw meat, little artificial food, e.g. kibble along with some vegetables and fruits. Additionally, the information gained from dogs could be used to suspect and test the effect on humans as they have strong pathophysiology similarities.
A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreBackground:-The Modified Alvarado Scoring System (MASS) has been reported to be a cheap and quick diagnostic tool in patients with acute appendicitis. However, differences in diagnostic accuracy have been observed if the scores were applied to various populations and clinical settings.
Objectives:- The purpose of this study was to evaluate the diagnostic value of Modified Alvarado Scoring System in patients with acute appendicitis in our setting.
Methods:-one hundre twenty eight patients ,were included in this study, admitted to Al-Kindy teaching hospital from June 2009 to June 2010. Patients’ age ranged from 8 to 56 years (21±10) they were divided into three groups; paediatrics, child bearing age females & adult males,. MAS
Background:-The Modified Alvarado Scoring
System (MASS) has been reported to be a cheap
and quick diagnostic tool in patients with acute
appendicitis. However, differences in diagnostic
accuracy have been observed if the scores were
applied to various populations and clinical settings.
Objectives:- The purpose of this study was to
evaluate the diagnostic value of Modified Alvarado
Scoring System in patients with acute appendicitis
in our setting.
Methods:-one hundre twenty eight patients, were
included in this study, admitted to Al-Kindy
teaching hospital from June 2009 to June 2010.
Patients’ age ranged from 8 to 56 years (21±10)
they were divided into three groups; paediatrics,
child bear
The aim of the research is to find out the availability of the requirements of applying the indicators of school performance system in the public schools in Mahayel Asir educational directorate through the school planning indicator, the safety and security indicator, the active learning indicator, the student guidance indicator and determining the existence of statistically significant differences between the responses of the research community according to the variable of (scientific qualification - years of work as a principal - training courses). The questionnaire was used as a tool for data collection from the research community, which consists of all the public schools’ principals (n=180) Mahayel Asir educational directorate
... Show MoreThe development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreSolar tracking systems used are to increase the efficiency of the solar cells have attracted the attention of
researchers recently due to the fact that the attention has been directed to the renewable energy sources. Solar tracking systems are of two types, Maximum Power Point Tracking (MPPT) and sun path tracking. Both types are studied briefly in this paper and a simple low cost sun path tracking system is designed using simple commercially available component. Measurements have been made for comparison between fixed and tracking system. The results have shown that the tracking system is effective in the sense of relatively high output power increase and low cost.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show More