Preferred Language
Articles
/
bsj-8244
Assessment of image quality of cervical spine complications using Three Magnetic Resonance Imaging Sequences
...Show More Authors

Examining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant differences among the three sequences used P˂0.05 with the exception of the contrast P˃ 0.05. For the cervical spines (C4-C5), the minimum CNR was noticed with the T2_TFE sequence. For the cervical spines (C5-C6), the CNR and SNR were higher when they were assessed by the 2D T2W TSE sequence as compared to the other sequences. The same findings were observed with the cervical spines (C6-C7). The subjective assessment of the degenerative cervical spine diseases showed that the T2_TFE sequence is excellent in terms of viewing the central stenosis and foraminal stenosis. The best MRI diagnostic imaging can be obtained using the Turbo Field Echo (T2_TFE) and the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE) sequences to gain detailed diagnostic information regarding the central stenosis and foraminal stenosis of the cervical spines (C4-C5, C5-C6, C6-C7)

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Rationalization of costs by using the tool of the quality function deployment: / applied research in the State Company for Textile and Leather Industries
...Show More Authors

The research aims to apply one of the techniques of management accounting, which is the technique of the quality function deployment on the men's leather shoe product Model (79043) in the General Company for Textile and Leather Industries by determining the basic requirements of the customer and then designing the characteristics and specifications of the product according to the preferences of the customer in order to respond to the customer's voice in agreement With the characteristics and technical characteristics of the product, taking into account the products of the competing companies to achieve the maximum customer satisfaction, the highest quality and the lowest costs. Hence, the importance of research has emerged, which indicat

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Science
Using of Remote Sensing Technique to Monitor The Status of The Plant and Change Detection for Three Different Periods in Western Region in Baghdad/ Iraq
...Show More Authors

Data of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased

... Show More
View Publication
Publication Date
Sun Jun 22 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An evaluation of an Iraqi phosphate-bonded investment and a commercial type on the marginal fit of ceramometalcopings using three different investing and burnout techniques
...Show More Authors

Background: The accuracy of fitness of any dental casting is imperative for the success of any prosthodontic treatment. From the time that dental casting was first introduced, efforts have been made to produce more accurate and better fitted castings with minimal marginal discrepancy. The aim of this in vitro study was to evaluate the effects of three different investing and burnout techniques on the vertical marginal discrepancies ofceramometalcopings invested with two types of phosphate- bonded investments. Materials and methods: Sixty wax patterns were fabricated on a standardized prepared brass die representing an upper central incisor by the aid of a custom-made split mold. Three different investing and burnout techniques were applied

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Effect of Temperature in Vertical Migration Behavior of Three Species Zooplankton
...Show More Authors

  The present study included  the impact of the follow-up variation in the temperature of aqueous medium in the vertical migration behavior of different groups of Zooplankton, consisted species Cyclops vernalis, Daphnia magna, Diaptomus dilopatus, that have been grown in controlled in terms of light and pH laboratory conditions, so choosing temperature of respectively 16,20,24,28, and 32 ËšC. The result showed a clear change in the migration behavior of testing planktonic species, it was a negative relationship between temperatures arises and individual of D. magna in the water column.While being appositive relationship with individual of C. vernalis and the same with D. dilopatus. Also, the result revealed a different impact

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Engineering Science And Technology (jestec)
Predicting Municipal Sewage Effluent Quality Index Using Mathematical Models In The Al-Rustamiya Sewage Treatment Plant
...Show More Authors

Efficient management of treated sewage effluents protects the environment and reuse of municipal, industrial, agricultural and recreational as compensation for water shortages as a second source of water. This study was conducted to investigate the overall performance and evaluate the effluent quality from Al- Rustamiya sewage treatment plant (STP), Baghdad, Iraq by determining the effluent quality index (EQI). This assessment included daily records of major influent and effluent sewage parameters that were obtained from the municipal sewage plant laboratory recorded from January 2011 to December 2018. The result showed that the treated sewage effluent quality from STP was within the Iraqi quality standards (IQS) for disposal and t

... Show More
Publication Date
Mon Nov 19 2018
Journal Name
Al–bahith Al–a'alami
Analytical Study of Cartoon picture AL-Mada Newspaper is a model
...Show More Authors

The researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 25 2018
Journal Name
International Journal Of Engineering Trends And Technology
Polynomial Color Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref