Introduction: Dental fear is defined as the patient’s specific reaction towards stress related to dental treatment in which the stimulus is unkn..
miRNAs regulate protein abundance and control diverse aspects of cellular processes and biological functions in metabolic diseases, such as obesity and diabetes. Lethal-7(Let-7) miRNAs specifically target genes associated with diabetes and have a role in the regulation of peripheral glucose metabolism. The present study aimed to describe the gene expressions of the let-7a gene with the development of diabetes in Iraq and the difference in the expression of this gene in patients with diabetes and healthy individuals. The association between age and gender with the development of diabetes was studied in this study and the results were compared with those of healthy individuals in the group of control. Based on the obtained results, there was
... Show MoreA field experiment was conducted on the form of the Dept. of Field Crop Sci. / College of Agriculture / University of Baghdad in spring and fall seasons of 2009 and 2010 . Ten inbreds of maize were planted and crossed to each other to produce single crosses . In the second season, single crosses were planted along with thin parent to produce three – way and double crosses . In the third seasons panet and crosses were planted . Crosses were selfed to produce F2 seeds and increase seeds of inbreds . In the fourth season, all grin types were planted , and their agronomic traits were evaluated . Values of P of inbreds , F1 and F2 were calculated for agronomic traits . The new formula to predict inbreeding depression ( ID ) F2 plant without gr
... Show MoreBackground: The aim of the present study is to evaluate the esthetic smile in sample of Iraqi adults and to assess the gender differences. Materials and Methods: 100 persons (50malesand 50 females had class I normal dental and skeletal selected for this study.Clinical examination and digital photograph with posed smile were performed for each individual. Six linear soft tissue parameters in each photograph using AutoCAD program 2011. Five visual and four quantitative evaluations of the smile were studied for eachsubject. The smile arch and index, buccal corridor spaces (BCSs) were studied.Descriptive statistics of the measurements were calculated. Independent student’s ttestswere used to evaluate the gender differences. Statistics: Desc
... Show More<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show More