BACKGROUND: Anemia during pregnancy is still a challenge throughout the world, and it may cause severe health consequences in the maternal and fetal sides. AIM: This study aims to find out the prevalence of maternal anemia and potential adverse outcomes in Iraq. METHODS: In Medical City Tertiary Center in Baghdad, singleton pregnant ladies came for delivery were involved over 6 months’ period. Based on hemoglobin (Hb) readings; they were divided into no anemia group (Hb>11 g/l) and anemia group which were further subdivided into mild, moderate, and severe (Hb =10–10.9, =7.1–9.9, and <7 g/l, respectively). Full history and examination were performed by attending obstetrician and pediatrician for the upcoming b
... Show MoreBACKGROUND: Anemia during pregnancy is still a challenge throughout the world, and it may cause severe health consequences in the maternal and fetal sides. AIM: This study aims to find out the prevalence of maternal anemia and potential adverse outcomes in Iraq. METHODS: In Medical City Tertiary Center in Baghdad, singleton pregnant ladies came for delivery were involved over 6 months’ period. Based on hemoglobin (Hb) readings; they were divided into no anemia group (Hb>11 g/l) and anemia group which were further subdivided into mild, moderate, and severe (Hb =10–10.9, =7.1–9.9, and <7 g/l, respectively). Full history and examination were performed by attending obstetrician and pediatrician for the upcoming babies. RE
... Show MoreNumber theorists believe that primes play a central role in Number theory and that solving problems related to primes could lead to the resolution of many other unsolved conjectures, including the prime k-tuples conjecture. This paper aims to demonstrate the existence of this conjecture for admissible k-tuples in a positive proportion. The authors achieved this by refining the methods of “Goldston, Pintz and Yildirim” and “James Maynard” for studying bounded gaps between primes and prime k-tuples. These refinements enabled to overcome the previous limitations and restrictions and to show that for a positive proportion of admissible k-tuples, there is the existence of the prime k-tuples conjecture holding for each “k”. The sig
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreIn this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima