Groupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is efficient, has very few free parameters to tune, and the authors show how to tune the few remaining parameters. Results show that the method reliably aligns various datasets including two facial datasets and two medical datasets of prostate and brain MRI images and demonstrates efficiency in terms of performance and a reduction of the computational cost.
From a group of 60 patients with dentoalveolar infections among which 10 were diabetic and 10 non-diabetic were elected as test group as well as 10 normal subjects as control group. Six Staphylococcus aureus and Streptococcus anginousus were diagnosed in the first and second group of the patients the immune status of the patients and control subject were tested by pathogen specific antibody titre, neotrophil NBT reduction phagocytosis and leukocyte inhibition LIF. Diabetic patients with dentoalveolar infection shows decreased specific antibody titers, subnormal neutrophil NBT phagocytic % as well as non significant LIF % in comparison non diabetic reveal high specific antibody titers against , high neutrophil NBT% and significant LIF% re
... Show MoreLe professeur Taranne et La non-Communication
Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
Abstract: Urinary Tract Infections (UTIs) are the most common bacterial infection in humans and a major cause of morbidity and they are the most common cause of hospital visits worldwide. Proper knowledge in identifying factors associated with urinary tract infection may allow the intervention to easily control of the disease in a timely manner. Therefore, the purpose of the study is determining the prevalence of UTI, diagnosis of causative bacterial agents and identifying the factors associated to the urinary tract infection among patients attending Medical City Hospital in Baghdad, Iraq. A total of 237, morning mid-stream urine samples were collected aseptically and the samples were diagnosed according to the standard methods. I
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
Objective(s): To assess the burden of mothers` care for child with colostomy and find out relationships between child and mother socio-demographic data with mothers` burden. Methodology: a descriptive study was conducted from 1 August 2013 to 1 September 2014. The sample consisted of 100 children and their mothers at Baghdad Teaching hospital in Baghdad city. A questionnaire was prepared based on the previous literature review, meeting mothers of children with colostomy, and the Zarit Burden Interview scale. Data has collected through the application of questionnaire and interview techniques. Results: T
Abstract
The goal of current research to describe and diagnose the level of attention of doctors to design and regulatory dimensions, (strategic vision, organizational structure, organizational processes, business systems, personnel), and the performance of hospitals and dimensions, in six hospitals in medicine and selected a sample for research, as well as identify organizational design effect in the performance of hospitals and dimensions (efficiency, the development of human resources, patient satisfaction, achieve financial results, quality of health care).
Research has focused in part theoretical on key variables to look organizational des
... Show More
In this paper, the using of Non-Homogenous Poisson Processes, with one of the scientific and practical means in the Operations Research had been carried out, which is the Queuing Theory, as those operations are affected by time in their conduct by one function which has a cyclic behavior, called the (Sinusoidal Function). (Mt / M / S) The model was chosen, and it is Single Queue Length with multiple service Channels, and using the estimating scales (QLs, HOL, HOLr) was carried out in considering the delay occurring to the customer before his entrance to the service, with the comparison of the best of them in the cases of the overload.
Through the experiments
... Show More