Astronomy image is regarded main source of information to discover outer space, therefore to know the basic contain for galaxy (Milky way), it was classified using Variable Precision Rough Sets technique to determine the different region within galaxy according different color in the image. From classified image we can determined the percentage for each class and then what is the percentage mean. In this technique a good classified image result and faster time required to done the classification process.
Objectives: The study aims to evaluate patients’ performance toward insulin injection after training program to
identify the variation in skill of patients in insulin injection technique with regard to some variable (i.e.
educational level and duration of insulin injection.
Methodology: A quasi experimental study has been conducted on diabetic patients.
An observational checklist had been prepared which consisted of 4 main areas with 37 sub-items, which are
syringe preparation for injection, insulin drawing; skin preparation for injection and insulin injection. Each of the
sub-items has 2 options yes or no. One score for positive answer and zero for no.
The sample of the study consisted of (n =30) males and females
Abstract
This study aimed to kmow the effect of food on appearance of ovaries cyst in women aged 15-54 year in Baghdad. City and its relation ship with reproductive health Woman samples was divided to four aged groups;15-24 , 25-34 , 35-44 and 45-54 years.
Results demonstrate that all samples of women has varied level of obesity.
Also we are noticed that all samples of women has varied level of obesity.
Also we are noticed tgat is a relation ship between obesity and marriagestatas with the highest proportion of ovarian cystsin obese marriage woman reached to37.90% The percent of un married women which have obesity class // with ovarian cysts reached50% Results refer to found that %19-24 of married women had obortians and
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreOne of the most important problems facing the world today is the energy problem. The solution was in finding renewable energy sources such as solar energy. The solar energy applications in Iraq is facing many problems . One of the most important problems is the accumulation of dust on the solar panels surface which causes decreasing its performance sharply. In the present work, a new technique was presented by using two-axis solar tracking system to reduce the accumulated dust on the solar panel surface and compared it with the fixed solar panels which installed at tilt angles 30° and 45°. The results indicated that the maximum losses of the output power due to accumulation of dust on the fixed solar panels is about 31.4% and 23.1% res
... Show MoreRetained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreThis research presents a new algorithm for classification the
shadow and water bodies for high-resolution satellite images (4-
meter) of Baghdad city, have been modulated the equations of the
color space components C1-C2-C3. Have been using the color space
component C3 (blue) for discriminating the shadow, and has been
used C1 (red) to detect the water bodies (river). The new technique
was successfully tested on many images of the Google earth and
Ikonos. Experimental results show that this algorithm effective to
detect all the types of the shadows with color, and also detects the
water bodies in another color. The benefit of this new technique to
discriminate between the shadows and water in fast Matlab pro
Research summary
Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreOne of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca
... Show More