As of late, humankind has experienced radiation issues either computerized tomography (CT) or X-rays. In this investigation, we endeavor to limit the effect of examination hardware. To do this the medical image is cropping (cut and zoom) then represented the vascular network as a graph such that each contraction as the vertices and the vessel represented as an edges, the area of the coagulation was processed already, in the current search the shortest distance to reach to the place of the blood vessel clot is computed
Infection at the site of vascular anastomosis is a serious complication of vascular surgery and is associated with a high limb loss and mortality rate. The classical method of management is ligation of the injured artery, adequate wound debridement and restoration of circulation. The latter is achieved by either in situ or extra-anatomic bypass. If the distal circulation is not maintained, subsequent amputation is most likely.
Objectives: In this study we tried to assess the efficacy of extra-anatomic synthetic bypass grafts in the treatment of vascular infection in the groin to save the limb and avoid the inevitable amputation.
Methods: Between January 2006 and December 2007, ten male patients aged twenty to thirty five years (mea
Abstract
Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has
... Show MoreThe minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons
To maintain river flows necessary to meet social and ecological objectives, instream environmental flows are frequently used as a strategy. The capability of three alternative historical flow approaches to protect against low flows is shown in this study using gage stations in the Shatt Al-Hillah River in Iraq. The extension of the Shatt al-Hillah River is the focus of this research discussion on environmental flow assessment. The available data on discharge in this research were adopted for ten years from 2012-2021. Different flow methods were adopted to establish a minimum environmental flow in the Shatt Al-Hillah River. Three hydrological-based approaches: Tennant, modified Tennant, and low-flow metrics like 7Q10, wer
... Show Morethe research ptesents a proposed method to compare or determine the linear equivalence of the key-stream from linear or nonlinear key-stream
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreThe Internet of Things (IoT) is a network of devices used for interconnection and data transfer. There is a dramatic increase in IoT attacks due to the lack of security mechanisms. The security mechanisms can be enhanced through the analysis and classification of these attacks. The multi-class classification of IoT botnet attacks (IBA) applied here uses a high-dimensional data set. The high-dimensional data set is a challenge in the classification process due to the requirements of a high number of computational resources. Dimensionality reduction (DR) discards irrelevant information while retaining the imperative bits from this high-dimensional data set. The DR technique proposed here is a classifier-based fe
... Show MoreControlling cost in construction projects is an essential issue. This study investigates the most critical problems that cause weakness in cost control in Iraqi construction projects. The quantitative technique was used by conducting a survey directed to professionals who work on construction projects. One hundred and sixty-four questionnaire forms were distributed to private sector companies, government companies, and government institutions, and the responses were subjected to the required statistical analysis. The results indicate that the most influential factors are the weakness in keeping up with the use of modern concepts, methods, and technologies, the delay in receiving the amounts due for work done from the owner, fluctuat
... Show MoreIn light of the enquiry raised by the Economist Mary Finn in 1995 concluding that high utilization in absorptive capacity of the economy is of inflationary tendency for industrial countries due to the equality between high rates of utilization of absorptive capacity and resource – shortage conditions leading to price inflation, the same idea was used to prove that budget utilization of operational costs and elevating absorptive capacity at the expense of investment budget leads to inflationary tendency that becomes a burden on financing the step- in policy of the Central bank to control prices through its foreign currency reserves at a time when the economy turned into an importer of non- tradable goods and being subject
... Show More