Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgro
... Show MoreA polycrystalline CdTefilms have been prepared by thermal evaporation technique on glass substrate at room temperature. The films thickness was about700±50 nm. Some of these films were annealed at 573 K for different duration times (60, 120 and 180 minutes), and other CdTe films followed by a layer of CdCl2 which has been deposited on them, and then the prepared CdTe films with CdCl2 layer have been annealed for the same conditions. The structures of CdTe films without and with CdCl2 layer have been investigated by X-ray diffraction. The as prepared and annealed films without and with CdCl2 layer were polycrystalline structure with preferred orientation at (111) plane. The better structural pr
... Show MoreIncremental sheet metal forming process is an advanced flexible manufacturing process to produce various 3D products without using dedicated tool as in conventional metal forming. There are a lot of process parameters that have effect on this process, studying the effect of some parameters on the strain distributions of the product over the length of deformation is the aim of this study.
In order to achieve this goal, three factors (tool forming shape, feed rate and incremental step size) are examined depending on three levels on the strain distributions over the wall of the product. Strain measurement was accomplished by using image processing technique using MATALB program. The significance of the control factors are explored u
... Show MoreBackground: To assess the alveolar bone crest level (ABCL) by Cone Beam Computed To-mography (CBCT) and to investigate several variables as predictors for the height of the alveolar bone in adolescents. Materials and methods: Age, sex, and ethnic groups were rec-orded for each patient. CBCT images were used to obtain measurements of the interproximal alveolar bone level from the cementoenamel junction (CEJ) to the alveolar crest. The highest measurement in each sextant was recorded along with any presence of a vertical bone defect or calculus. Results: Total of 720 measurements were recorded for 120 subjects. No vertical bony defects or calculus were observed radiographically. Statistically significant (P< 0.05) differences were observed be
... Show MoreThe industrial development and raise the level of income that has emerged clearly in the middle of the last century in many rich and medium rich countries has great influence on the risen of the health care level. Which led to a significant increase in the reconstruction of people over 65 years and this in turn has produced markets for products and services through modifications to the existing products to meet their physical needs. The importance of research also has the universal design of a comprehensive actually so that it covers as much as possible from human physical & cultural activities. The importance of research locally is to concentrate on this subject who has not been taken into consideration so far to accommodate the eld
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show More