The present study is a hybrid method of studying the effect of plasma on the living tissue by using the image processing technique. This research explains the effect of microwave plasma on the DNA cell using the comet score application, texture analysis image processing and the effect of microwave plasma on the liver using texture analysis image processing. The study was applied on the mice cells. The exposure to the plasma is done by dividing the mice for four groups, each group includes four mice (control group, 20, 50, 90 second exposure to microwave plasma). The exposure to microwave plasma was done with voltage 175v and gas flow on 2 with room temperature; the statistical features are obtained from the comet score images and the textural features are calculated from the texture matrix energy measure. The result shows that the plasma has a clear effect on the DNA by reaper the damage cell and affecting the liver enzyme. The microwave plasma affected the ALP (Alkaline phosphatase) enzyme Alanine amino Transferase (ALT), Aspartate amino Transferase (AST) by decreasing their value with time exposure. This has been analyzed and studier by the textural analysis.
The study aimed to prepare a set of qualifying exercises to improve the muscular strength of the muscles surrounding the ankle joint by applying different resistances according to the nature of the movement of this joint, which is one of the second moving joints (flexion, extension and rotation of the right and left) in order to increase the efficiency of all muscles working on this joint according to those movements and identification On the impact of these exercises and assume that there will be statistical differences between the two tests of the research sample. The researcher used the semi-articulated experimental method with a pre- and post-test for one group. The injury was evaluated on the women's national team players durin
... Show Morethe researchers Sought to determine the impact of the customer contact (Within a client contact there are two times, first is the total time required to create a service and within it there is contact time while the second time is the time of client contact ؛ where means a time that records the physical presence of the customer during the process of service) on operations performance by concentrate attention on the cost (labor productivity) and quality (patient ratio to the doctor) and speed (cycle time) and flexibility (the flexibility range) , as well as ruling out variable of innovation because of impossibility to measure this variable in the Specialty Center for Dental in al-alwia due to the center is lacking of mechanisms t
... Show MoreABSTRACT
Impkact of Knowledge sharing on organizational innovation Impriscal study in Arabic company .
of Knowledge Management is the main component Knowledge sharing system, it mean the exchange if Knowledge, ideas, and good practice with another individual . Knowledge sharing between persons, then its values can growth .
It is vry important because it can provide us with the contention between virus peoples . the interaction among the people can pass all kind of Knowledge among them. the connection and interaction and interaction enabl
... Show MoreThe problem of research is that there are differences between learners in processing in formation in general and there is variation at the learners level perform scrolling skill of the passes up and down by the volley ball .Therefore the researchers decided to conduct astudy through which identify the relationship between information processing and the skill of scrolling from the top and bottom by the volleyball. The researchers used the descriptive approach by themethod of interconnectivity .Asampleconsist of21 students from first staye in collage of physical education and sports science for Girls(university of Baghdad) and attest has been applied(process information and scroll up and down) on the research sample after the required
... Show MorePlasma generated by a 1064 nm pulsed Nd: YAG laser with pulse duration of 10 ns concentrated onto an Al solid target under vacuum pressure was examined spectroscopically. The temperature and electron density specifying the plasma were measured by time-resolved spectroscopy of neutral atom and ion line emissions in the time period range of 300–2000 ns. An echelle spectrograph is utilized to appear the plasma emission lines. The temperature was obtained using the spectral line comparison method and the electron density was calculated using the Stark Broadening (SB) method. The electron density was characterized as a function of laser pulse energy. The time range where the plasma is optically thin and is also in local thermodynamic equilibri
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More