LK Abood, RA Ali, M Maliki, International Journal of Science and Research, 2015 - Cited by 2
Three types of medical commercial creams Silvazine, Cinolon Tar and Hydroquinon Domina were incorporated in this study. The medical creams were taken directly and placed uniformly on the glass slide. Each type of pharmaceutical was weighed at 1 mg and dispersed on an area of 1x1 cm. This process ensures same thickness for all samples. The creams were analyzed by using double-beam UV/visible spectrophotometer Metertech SP8001. The absorption spectrum for each of samples was measured against wavelength range of 300–700 nm.
In this paper, the solar surface magnetic flux transport has been simulated by solving the diffusion–advection equation utilizing numerical explicit and implicit methods in 2Dsurface. The simulation was used to study the effect of bipolar tilted angle on the solar flux distribution with time. The results show that the tilted angle controls the magnetic distribution location on the sun’s surface, especially if we know that the sun’s surface velocity distribution is a dependent location. Therefore, the tilted angle parameter has distribution influence.
Tuberculosis continues to be the leading cause of morbidity and mortality, with an estimated annual incidence of 10.4 million worldwide. It has been estimated that 10% of patients with extrapulmonary tuberculosis have musculoskeletal involvement, with the spine being the most common. Spinal tuberculosis (TB) accounts for 50% of cases of musculoskeletal tuberculosis.
Spinal tuberculosis is the result of infection with Mycobacterium tuberculosis. It is a secondary infection, the primary lesion of which is in the lungs, genitourinary system, or gastrointestinal tract and can be active or latent. Involvement of the vertebral segment is the result of hematogenous spread of infection along the arterial pathway or Batson's vei
... Show MoreMobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
Breast cancer is the most common malignancy affecting women's health, with an increasing incidence worldwide. This study aimed to measure the intracellular concentration of the hypoxia-inducible factor 1 α (HIF-1α), tumor suppression protein p53, and estradiol (E2) in tumor tissues of adult females with breast cancer and their relation to tumor grade, tumor size, and lymph node metastases (LNM). The study was conducted on 65 adult female participants with breast mass admitted to the operating theater in Al-Hussein Teaching Hospital and Al-Habboby Teaching Hospital in Nasiriyah, Iraq, from January to November 2021. Fresh breast tumor tissues were collated and homogenized for intracellular biochemical analysis using the enzyme-linked immuno
... Show MoreThis paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreThe concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show More