Background: Ultrasonography has been used to examine the thickness of the lower uterine segment in women with previous cesarean sections in an attempt to predict the risk of scar dehiscence during subsequent pregnancy. The predictive value of such measurement has not been adequately assessed. Objectives: To correlate lower uterine segment thickness measured by trans abdominal ultrasound in pregnant women with previous cesarean section with that measured during cesarean section by caliper and to find out minimum lower uterine segment thickness indicative of integrity of the scar.Methods: A prospective observational study at Elwyia Maternity Teaching Hospital, from January 2011 to January 2012. A total of 143 women were enrolled in the stu
... Show MoreA fluorescence microscopy considered as a powerful imaging tool in biology and medicine. In addition to useful signal obtained from fluorescence microscopy, there are some defects in its images such as random variation in brightness, noise that caused by photon detection and some background pixels in the acquired fluorescence microscopic images appear wrongly auto-fluorescence property. All these practical limitations have a negative impact on the correct vision and analysis of the fluorescent microscope users. Our research enters the field of automation of image processing and image analysis using image processing techniques and applying this processing and analysis on one of the very important experiments in biology science. This research
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreA novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode
... Show MoreThe performa of evaluation process is a process that should be carried out by all industrial management in order to stand on aspects of development or underdevelopment of the various departments and activities in its industrial project for the purpose of identifying obstacles and find out the causes and then avoid them quickly. And intended to rectify the performance evaluation of the activities of industrial project or economic union by measuring the results achieved within a specific operational process and compare it to what is already targeted, and often the time for comparison of one year.
The process of performance evaluation depends upon several criteria and indicators within the
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreThe importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.
Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part
... Show More