Stimulative effect of 10 mW He-Ne laser on the phagocytic activity of human polymorphonuclear leukocytes( PMNs) has been studied in vitro. Normal polymorphonuclear leucocytes were isolated from the human peripheral blood. A mixture of 0.25 ml of Hanks solution, 0.25 ml of serum, 0.25 ml of Candida albicans suspension and 0.25 ml of PMNs suspension was prepared. The samples of mixture of PMNs and Candida were subdivided in 1 ml ependrof tubes and irradiated to He-Ne laser for 1, 3, 5, 10 and 20 min. The diameter of the irradiated area was 0.8 cm. For calculation of Phagocytic index before and after irradiation, the samples were incubated (37°C) at 5, 15, 30, 60 min. The slides of samples were prepared and stained using Giemsa stain. The results showed that the bio-stimulative effect of 10 mW He-Ne laser on the phagocytic activity of( PMNs) is more observable at 3 min exposure time with 5 mW/cm2 power density. Many action mechanisms were reviewed and discussed in the term of possible photo- acceptor when cells are irradiated to laser.
The current research aims to determine the extent of the impact of the strategic direction to the business process reengineering, in the Office of the Ministry of Oil To reach that goal was a sample of community research study consisted (50) members of the senior leadership represent the problem in organization researched in the ambiguity of the strategic direction of knowledge of the compatibility of the strategic direction with Business Process Reengineering and used questionnaire, interview and observation to obtain the information needed to search was addressing data by the statistical system spss percentage and the arithmetic mean, standard deviation and coefficient of variation .
... Show MoreBumpiness in the atmosphere is the vertical movement of air, whether
upward or downward movement and the bumpiness is accompanied by areas
of unrest in the air and wind. And contribute to each of the coups thermal
fronts, wind, wind and thunderstorms. Moreover, bumpiness is net of the
reasons that lead to circumstances is appropriate to cut the wind, and this
contributes to the formation of bumpiness in the atmosphere. The study found
that the noon of the times, which is expected to occur where clear-air
bumpiness during flights because of the warmth of the earth's surface. The
study found increased incidence of air hole during the summer, especially
July, due to increased incidence of coup surface, while the s
The research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative model for the quadratic programming models.
The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's performance .
Companies seek to enhance investor confidence by achieving the highest level of transparency in disclosure of financial and non-financial information (SASB standards) for Iraqi insurance companies listed on the financial market. The aim of the research is to identify the extent of the ability of financial and non-financial information to enhance transparency in reporting, which is reflected in Investor confidence. And the standards of sustainability development accounting issued by (SASB) through the electronic questionnaire that was distributed. Companies seek to achieve a set of goals, the most important of which is to enhance investor confidence by improving transparency in disclosure. Concerning the employment of financial an
... Show MoreIn Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More