In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like iden
... Show More
Genetic material is the most important component of cells because it contains the genetic information; hence any disruption to the structure chromosome of cells could lead to very bad results. Genotoxicity use to evaluate the safety of any chemical compounds on genetic materials. Artificial food flavoring additive are chemical substances to produce specific placebo effects added to foods but impart specific flavor to it.
The present study evaluates the genotoxic effect of artificial food flavoring additive on structure of chromosomes at three different concentrations (50%, 100%and 150%) on both bone marrow cells and spleen cells in mice for fourteen successive days. It was found that artificial food flavoring addit
... Show MoreBackground Immunological gene and serum level for interleukin- 9 rs 17317275 have been established to have linked to predisposition systemic lupus erythematosus (SLE) and its severity. SLE is a severe, systemic autoimmune disease characterized by autoantibody generation, complement activation, and immune complex deposition. In the pathophysiology of SLE, cytokines have a pleiotropic function. Recently, IL-9 was discovered to mediate strong anti-inflammatory effects in numerous cells or experimental autoimmune models. Objective This study aimed to determine the role of age, IL-9 serum level and genetic polymorphism, C-reactive protein (CRP), Anti-nuclear antibody (ANA) and Anti- double-stranded DNA (anti-dsDNA) to recognize SLE pathogenesis.
... Show MoreFadak farm project was selected to conduct this study in and to evaluate the state of quality and health indices in term of soil physical properties, where this farm is located in Holly Najaf Governorate. Some physical properties (soil texture, mean weight diameter, bulk density, porosity, infiltration rate, saturated hydraulic conductivity and available water) were selected to assess the quality then health indices, Results showed that classes of moderate and poor soil health were dominated in lands of this farm for physical properties It was noted that the class good of soil health wasnot collaterally appeared in areas for the physical characteristics.
Objective: The study aimed to evaluate knowledge and practices of nursing staff at the orthopedic units
regarding the existing care of patient with skin traction.
Methodology: The sample consists of (40) nurses, (20) of them from Emergency Teaching Hospital in Duhok
and the other (20) of them from Erbil Teaching Hospital in Erbil from 1st Dec. 2004 to the end of June 2005 in
Kurdistan Region.
Two instruments were constructed to evaluate knowledge and practices. Evaluation of knowledge was done by
using of multiple choice questions composed of (25) questions, and evaluation of practice was done by using the
observational check list which consist of four main category (pre skin traction, during skin traction, post skin
Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreA coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show More