Theatrical art, from (Plato) to (Heidegger), passing through (Husserl) and (Husserl) has propagated the parallel relations between the overlapping formal patterns in the world of hypotheses crowded with diaspora and scattering, leading to the manifestations of implicit meaning in the intellectual and aesthetic discourse, through the deconstructive pattern that restructures The aesthetic image according to the aesthetic data to be employed, so the effectiveness of the deconstructive system had an important role in authorizing the Ghanaian logic and continuity on which the Western meta meaning was based, and the artistic scene was subjected to it in line with literature and art to be able to pay attention to the achievement and clarify it
... Show MoreColon cancer is an abnormal growth of cells that occurs in the large intestine. Sometimes growth remains restricted for a relatively long time before it becomes a malignant tumor and then spreads through the intestinal wall to the lymph nodes and other parts of the body. The study aims to estimate the effectiveness and partial purification of lipoxygenase (LOX) enzyme and measure gamma-glutamyle transferase (GGT) activity in serum patients of colon cancer in Baghdad. The study included (80) case male patients with colon cancer with (50) samples of apparently healthy males (control) as comparison group. The result displayed a noteworthy increase in lipoxygenase effectivene
... Show MoreProstate cancer (PC), accounts for more than one-fourth of all cancer diagnoses, and the most frequently diagnosed cancer among men in 2022. The immunoglobulin (IG) Program death ligand-1(PD-1) cell surface receptor is predominantly expressed on the surface of many cells. The purpose of this study was to demonstrate the relationship between Program death ligand expression and some aggressive features of prostate cancer including perineural invasion, vascular invasion and necrosis. Thirty cases of prostate cancer with age range from 60 to 80 year old and 30 cases of normal prostate tissue with age under 25 year old were separated into two groups in a retrospective case-control
... Show MorePhase-change materials (PCMs) have a remarkable potential for use as efficient energy storage means. However, their poor response rates during energy storage and retrieval modes require the use of heat transfer enhancers to combat these limitations. This research marks the first attempt to explore the potential of dimple-shaped fins for the enhancement of PCM thermal response in a shell-and-tube casing. Fin arrays with different dimensions and diverse distribution patterns were designed and studied to assess the effect of modifying the fin geometric parameters and distribution patterns in various spatial zones of the physical domain. The results indicate that increasing the number of
The DC electrical conductivity properties of Ge60Se40-xTex alloy with x = 0, 5, 10, 15 and 20). The samples were formed in the form of discs with the thickness of 0.25–0.30 cm and the diameter of 1.5 cm. Samples were pressed under a pressure of 6 tons per cm2 , using a ton hydraulic press. They were prepared after being pressed using a ton hydraulic press using a hydraulic press. Melting point technology use to preper the samples. Continuous electrical conductivity properties were recorded from room temperature to 475 K. Experimental data indicates that glass containing 15% Te has the highest electrical conductivity allowing maximum current through the sample compared to Lu with other samples. Therefore, it is found that the DC co
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreIn cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show More