Objective Using two complementary techniques of virus detection human papillomavirus (HPV)[capture of hybrids (CH) and polymerase chain reaction (PCR)], relate the cytological study and/or cervical biopsy with high-risk HPV (HPV-HR) genotypes presence, as well as relating their viral load (VL). Methods About 272 women, who presented most cell alterations compatible with lesions cervical HPV, which has been detected in all high risk by the CH method and HPV genotype detection by PCR. Results In 22% of the patients it was not detected HPV DNA. Genotype 16 and/or 18 was prevalent and was found in 33% of the 212 women studied, meanwhile, mixed infections were found by several genotypes in 25%. In as for the histological lesions found, in 61 patients with squamous intraepithelial lesions of high grade (H-SIL) and cancer, 55.73% presented genotypes 16 and/or 18, while in 38 patients with presence of altered squamous cells of significance uncertain (ASCUS) and 126 with squamous lesions low-grade intraepithelial (L-SIL), were put on manifest these genotypes only in 7.9% and 22.2%, respectively (p< 0.05). About 12.13% of the 272 patients had a VL< 3 pg/ml. In those with an HPV VL> 3 pg/ml, were HPV-AR found in 77.40% of these (p< 0.05). Conclusions In patients with H-SIL biopsy revealed genotypes 16 and/or 18. The CH2 technique is useful as a screening procedure, while PCR is interesting to identify HPV-HR genotypes
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This paper studies the investment project evaluation under the condition of uncertainty. Evaluation of investment project under risk and uncertainty is possible to be carried out through application of various methods and techniques. The best known methods are : Risk-adjusted discount rate , certainty equivalent method , Sensitivity analysis and Simulation method The objective of this study is using the sensitivity analysis in evaluation Glass Bottles project in Anbar province under the condition of risk and uncertainty.
After applying sensitivity analysis we found that the glass bottles project sensitive to the following factors (cash flow, the cost of investment, and the pro
... Show MoreMixed Kirkuk and Sharki-Baghdad crude oils were distilled into narrow fractions. The range of these narrow fractions were 10oC, starting from IBP to 350oC. The total distillates from mixed Kirkuk and Sharki-Baghdad crude oils were 58.25 vol % and 44.65 vol %, respectively.The hydrocarbons compositions (paraffin, naphthene, aromatic) in light fractions starting from IBP to 250oC were determined by using PONA analysis method. The results show that the paraffin content decreases with increasing mid percent boiling point of the fraction, while the naphthene, and aromatic increase with the increase of mid percent boiling point of mixed Kirkuk and Sharki-Baghdad crude oils. Three groups of empirical equations were developed for the prediction
... Show MoreThis research came to shed light on the relationship between the requirements of (practices) high commitment management (participative decision making،information sharing، training and development،team working،rewards،selective staffing،job security ) and strategic entrepreneurship dimensions (entrepreneurial culture،entrepreneurial leadership،entrepreneurial mindset، strategic management resources ) Sought to achieve the number of goals the knowledge and applied, and tested the relationship and impact between variables in a sample size of 100 directors of personnel departments and divisions and their associates in the Iraqi contractors in Baghdad (Hamorabi، Mutassim، AL Rasheed، AL Mansour )، focused research
... Show MoreBack ground: Skin grafting is the most common form
of reconstructive surgery, and regeneration of
sensations in skin grafts is a complex process
influenced by many factors such as , the thickness of
the graft, the depth of the grafted bed, meshing of the
graft, the condition of the bed and the surrounding
area. So many studies performed on this subject, some
of them clinically based on subjective type of sensation
tests, and others histological to detect the presence of
nerve fibers in the grafted skin
Objectives: To detect return of sensations to split
thickness skin grafts by clinical methods.
Methods: From Oct. 1995 to Oct. 2010, a clinical
prospective study performed in Al wasity Hospital for
High performance work systems and general industrial enterprise performance
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More<span>Digital audio is required to transmit large sizes of audio information through the most common communication systems; in turn this leads to more challenges in both storage and archieving. In this paper, an efficient audio compressive scheme is proposed, it depends on combined transform coding scheme; it is consist of i) bi-orthogonal (tab 9/7) wavelet transform to decompose the audio signal into low & multi high sub-bands, ii) then the produced sub-bands passed through DCT to de-correlate the signal, iii) the product of the combined transform stage is passed through progressive hierarchical quantization, then traditional run-length encoding (RLE), iv) and finally LZW coding to generate the output mate bitstream.
... Show More