CO2 Laser (10600nm) is the recent method in the management of challenging skin scar resulting from trauma, burn and surgical wound. The aim of this study was to evaluate the efficacy & safety of fractional CO2 laser (10600nm) in treatment of skin scar. Materials and Methods:Twenty patients with different types of scars treated with fractional CO2 (10600nm) laser, (10 patients) were given additional intralesional Triamcinolone. Results: All of the twenty patients included in this study showed some sort of improvements in scar texture, height and pliability and all of the ten patients who received intralesional Triamcinolone after laser show complete satisfaction. Conclusion:Fractional CO2 (10600nm) laser can be used as alternative, ef
... Show MoreRecently digital mammography is most widely used technology for early detection of breast cancer. The main diagnosing elements such as lesion or masses in digital mammograms are with law contrast. The purpose of this paper is to enhance the mammogram images by increasing its contrast. Different enhancement method are used for this purpose such as histogram equalization (HE), Contrast Limited Adaptive Histogram Equalization (CLAHE), Morphological, and Retinex. The Retinex method also implement by combining it with HE once, and with CLAHE to improve its performance. The experimental results show that using Retinex with CLAHE can produce an image with enhancement in contrast better than using it with HE method and better than other methods
... Show MoreThree bacterial species were isolated from three polluted soils with gasoline which leaks from electricity generators that used in different regions in Baghdad; the regions choices to collect the polluted soils were (Al-Shaab, Al- Jadryia and Al-Saydiya). The bacterial species were identified according to international biochemical methods. It was found that these species were Escherichia coli, Enterobacter aerogenes and serratia marcesens. It was found that the optimum temperature and pH were 37C°and 9 these were to cultivate E.coli and S.marcesens, while for E.aerogenes were 25 C° and 9. &
... Show MoreThe researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreHome New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreEx-situ bioremediation of 2,4-D herbicide-contaminated soil was studied using a slurry bioreactor operate at aerobic conditions. The performance of the slurry bioreactor was tested for three types of soil (sand, sandy loam and clay) contaminated with different concentration of 2,4-D, 200,300and500mg/kg soil. Sewage sludge was used as an inexpensive source of microorganisms which is available in large quantities in wastewater treatment plants. The results show that all biodegradation experiments demonstrated a significant decreases in 2,4-D concentration in the tested soils. The degradation efficiency in the slurry bioreactor decreases as the initial concentration of 2,4-D in the soils increases.A 100 % removal was achieved at initial con
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe determination of manganese (II) using flow injection analysis with chemiluminescence detection was investigated. Mn2+ in sample solutions injected into a carrier stream of sodium bismuthate (NaBiO3) were oxidised to form MnO4- ions which were capable of producing luminescence after reaction with luminol/KOH in a flow cell. The linear range of the system is from 20 to 80 mg/L with a detection limit 8 mg/L. The proposed system is suitable for determination of Mn2+ in steel alloys after dissolution, filtration and dilution at a rate of approximately 60 samples per hour with a relative standard deviation (RSD)1.2%. Statistical comparison between the proposed system and standard spectrophotometric method revealed that there is no signific
... Show MoreRecently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show More