Preferred Language
Articles
/
jbcd-166
Cephalometric analysis of craniofacial deformity of ?-thalassemic major by using computed tomography
...Show More Authors

Background: Thalassemia is a hereditary anemia resulting from defects in hemoglobin production. ?- thalassemia caused by decrease in the production of ?- globin chains affect multiple organs and is associated with cranio-oro-facial deformity which include prominent cheek bones and protrusive premaxilla with depression of the nasal bridge often referred to as “rodent or chip-munk face” with small mandible and Cl.II skeletal relationship. This study aimed to investigate cephalometric craniofacial parameters (skeletal) of ?- thalassemic major patients by using computed tomography and to compare findings with a group of healthy patients in the same age group. Subject, Materials and Method: The study included (40) patients with ?- thalassemic major (20 female and 20 male) with age 8-15years compared with (40) healthy controls (20 female and 20 male) with the same age, who admitted to spiral computed tomography scan unit in X-ray institute in AL-KARKH general hospital to have computed tomography scan for the brain, paranasal and for orthodontic purpose from October 2011 to June 2012. Cephalometric analysis of the selected four skeletal linear measurements and four skeletal angular measurements, by using direct analysis with software programs in a computer which is part of the computed tomography machine. Results: There was no statistically significant difference between thalassemic males and females in all selected skeletal linear and angular measurements, Thalassemic patients have a highly significant large ANB angle and cl II skeletal relationship, significant larger gonial angle, Mandibular base length (Me-Go) is significantly shorter, Retrognathic mandible (SNB) is significantly decreased, highly significant shorter in total anterior facial height (N-Me) and total posterior facial height (S-Go), and also the Ramus height is highly significant decreased. Conclusion: In thalassemic patients, the skeletal morphology is recognizable and mandible is retrognathism and they have skeletal cl. II pattern and Computed tomography is useful tool for assessment of the cranio facial measurement.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 01 2024
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Classification of grapevine leaves images using VGG-16 and VGG-19 deep learning nets
...Show More Authors

The successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the domain of deep learning, further advancements and refinements in the models and datasets can be expected, potentially leading to even more accurate and efficient classification systems for grapevine leaves and beyond. Overall, this research provides valuable insights into the potential of deep learning for agricultural applications and paves the way for future studies in this domain. This work employs a convolutional neural network (CNN)-based architecture to perform grapevine leaf image classifi

... Show More
View Publication
Crossref (10)
Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Smoothing Image using Adaptive Median Filter
...Show More Authors

Median filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 27 2023
Journal Name
Tem Journal
Predicting Age and Gender Using AlexNet
...Show More Authors

Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application

... Show More
View Publication
Scopus (8)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Hemorrhoidectomy Using (10600 nm) CO2 Laser
...Show More Authors

Hemorrhoids are one of the most common surgical conditions. The hemorrhoid may cause symptoms that are: bleeding, pain, prolapse, itching, spoilage of feces, and psychologic discomfort. There are many methods for treatment of hemorrhoid like, medical therapy, rubber band ligation, electerocoagulation, stapled hemorrhoidpexy, photocoagulation, sclerothereapy, doppler guided artery ligation, Cryosurgery, and surgery. All methods for treatment of hemorrhoids have advantages, disadvantages, and limitations. Conventional haemorrhoidectomy was the traditional operation for the treatment of hemorrhoids. But recently other modalities of treatment had been used as an alternative operations including CO2 laser haemorrhoidectomy. This work aims to

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Direction Finding Using GHA Neural Networks
...Show More Authors

 This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).

 

 

View Publication Preview PDF
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ssrn Electronic Journal
Human Mobility Patterns Modelling Using Cdrs
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors