In some cases, surgeons need to navigate through the computer system for reconfirmation patients’ details and unfortunately surgeons unable to manage both computer system and operation at the same time. In this paper we propose a solution for this problem especially designed for heart surgeon, by introducing voice activation system with 3D visualization of Angiographic images, 2D visualization of Echocardiography processed video and selected patient’s details. In this study, the processing, approximation of the 3D angiography and the visualization of the 2D echocardiography video with voice recognition control are the most challenging work. The work involve with predicting 3D coronary three from 2D angiography image and also image enhancement which utilize the median filtering, morphological opening and contrast improvement and heart boundaries detection. With 3D reconstruction of 2D angiography images, the system was able to display 3D coronary tree, with voice activation. The system was able to rotate, zoom in and out the 3D image, the 2D echocardiography video and display patient’s information that needed by the surgeon while doing heart surgery. Development of this system is useful for surgeons, where they can navigate the system using voice commands instead of keyboard and mouse. Medical practitioners also can facilitate more the angiogram and echocardiograph images. With this system, it can help and ease the work of surgeons in analyzing and processing the medical images especially in-vivo procedure.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe Light and the Dark is the fourth novel in a series written by Charles Percy Snow where it tackles a phase of gifted scholar and remarkable individual Roy Calvert as he search for a source of power and meaning in life to relieve his inner turmoil. The character Roy Calvert is based on Snow's friend, Charles Allbery who exposes the message the character of Roy intends to convey in a certain phase of his life and the prophecy the novel carries amid catastrophe so widespread in the thirties of the twentieth century
In this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both
... Show MoreThis research aims to develop transdermal patches of Ondansetron hydrochloride (OSH) with different types of polymers, ethyl cellulose and, polyvinyl pyrrolidone k30 in a ratio (3:0.5,3:1,3:2,2:1,1:1) with propylene glycol 20%w/w as a plasticizer. Prepared transdermal patches were evaluated for physical properties. The compatibility between the drug and excipients was studied by Differential scanning calorimetry (DSC), where there is no interaction between the drug and polymers. From the statistical study, there is a statistical difference between all the prepared formulations p<0.05. In-vitro Release study of transdermal patches was performed by using a paddle over the disc. The release profile of OSH follow
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreThis paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi
... Show MoreObjective: To determine the quality assurance for maternal and child health care services in Baghdad City.
Methodology: A descriptive study is conducted throughout the period of November 28th 2008 to October 10th
2009. A simple random sample of (349) is selected through the use of probability sampling approach. The study
sample was divided into four groups which include (220) consumers, (35) medical staff, (72) nursing staff and (22)
organization structure (primary health care centers). Data were collected through the use of assessment tools. It was
comprised of four questionnaires and overall items included in these questionnaires are (116) items. The study
included assessment of organization structure. Data were colle
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More