Many therapeutic methods used to encourage reparative processes of cartilage and accelerate their healing such as drugs, magneto-laser and so on. Twenty four adult New Zealand rabbits used in this study. They were divided in to two groups; control and treaded with He –Ne laser. A square skin flap done on the medial aspect of both auricles followed by pealing a square piece of cartilage from the auricle then the flaps sutured .The site of the operation in the rabbits of the treated group were irradiated with He –Ne laser 5mw power for seven days began after the operation directly. 3 rabbits from each group used for collection of specimens for histopathological examination at the 1, 2, 4 & 6 weeks post the operation. Significantly well developed cartilage growth, chondroblasts and chondrocytes invade the area of the operation .High increase in the thickness of connective tissue in the same area contain mainly collagen fibers and lesser amount of elastic fibers. He –Ne laser irradiation raised the mitotic activity of the cartilage cells, activated the reproduction processes in addition to the intra and extra regenerative repair
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeletonization and Fusion. The Normalization process standardized the pixel intensity which facilitated the processing of subsequent image enhancement stages. Subsequently, the Histogram Equalization technique increased the contrast of the images. Furthermore, the Binarization and Skeletonization techniques were implemented to differentiate between the ridge and valley structures and to obtain one
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this study, we have created a new Arabic dataset annotated according to Ekman’s basic emotions (Anger, Disgust, Fear, Happiness, Sadness and Surprise). This dataset is composed from Facebook posts written in the Iraqi dialect. We evaluated the quality of this dataset using four external judges which resulted in an average inter-annotation agreement of 0.751. Then we explored six different supervised machine learning methods to test the new dataset. We used Weka standard classifiers ZeroR, J48, Naïve Bayes, Multinomial Naïve Bayes for Text, and SMO. We also used a further compression-based classifier called PPM not included in Weka. Our study reveals that the PPM classifier significantly outperforms other classifiers such as SVM and N
... Show MoreA survey of haemoproteids among the eight species of Iraq rallids were carried out in the
middle, south, and west of Iraq. Two haemoproteods were recorded, Haeomproteus porzanae
(Galli-Valerio, 1907) as a new record for Iraq and the new species H. baghdadensis described
from Fulica atra L. collected in the middle of Iraq.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe slums one of the main problem plaguing the city of Baghdad in general and
the unity of municipality of New Baghdad, especially, where the characteristics of the study
area a prominent role in population growth and the emergence of slums where a private,
although the region suffer from the housing crisis is the lack of the number of housing units
compared to the number of families in which, With high land prices and the level of rent
which was accompanied by the absence of the law, which was followed by the year 2003, has
become the study area and one of the most municipalities of the city of Baghdad Contain
slums which took fills abandoned buildings and acquires vacant land agricultural ones and
allocated to d
A new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .