Background: Determination of sex and estimation of stature from the skeleton is vital to medicolegal investigations. Skull is composed of hard tissue and is the best preserved part of skeleton after death, hence, in many cases it is the only available part for forensic examination. Lateral cephalogram is ideal for the skull examination as it gives details of various anatomical points in a single radiograph. This study was undertaken to evaluate the accuracy of digital cephalometric system as quick, easy and reproducible supplement tool in sex determination in Iraqi samples in different age range using certain linear and angular craniofacial measurements in predicting sex. Materials and Method The sample consisted of 113of true lateral cephalometric radiographs for adults with age range from 22-43 years old (51 males, 62 females), using certain linear and angular craniofacial measurements with the aid of computer program “AutoCAD 2007” Results: The eleven parameters measured for males and females when compared are statistically significantly different. All cranio-cephalometric measurements gave overall predictive accuracy of sex determination by discriminant analysis (86.7%). The stepwise selection method gave overall predictive accuracy of sex determination by discriminant analysis (85.8%). Age showed no statistical difference among the studied age range except for the distance from Mastoid to Frankfort plane. Conclusion: The lateral cephalometric measurements of craniofacial bones are useful to support sex determination of Iraqi population in forensic radiographic medicine.
The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore, the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of the mobile network and its wide usage through different types of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat
... Show MoreConcealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary, hide two bits from the message in two bits of the least significant b
... Show MoreBackground: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis research involves studying the influence of increasing the
number of Gaussian points and the style of their distribution, on a circular exit pupil, on the numerical calculations accuracy of the point spread function for an ideal optical system and another system having focus error of (0.25 A. and 0.5 A. )
It was shown that the accuracy of the results depends on the type of
distributing points on the exit pupil. Also, the accuracy increases with the increase of the number of points (N) and the increase of aberrations which requires on increas (N).
Fusobacterium are compulsory anaerobic gram-negative bacteria, long thin with pointed ends, it causes several illnesses to humans like pocket lesion gingivitis and periodontal disease; therefore our study is constructed on molecular identification and detection of the fadA gene which is responsible for bacterial biofilm formation. In this study, 10.2% Fusobacterium spp. were isolated from pocket lesion gingivitis. The isolates underwent identification depending on several tests under anaerobic conditions and biochemical reactions. All isolates were sensitive to Imipenem (IPM10) 42.7mm/disk, Ciprofloxacin (CIP10) 27.2mm/disk and Erythromycin (E15) 25mm/disk, respectively. 100% of
This study was designed for isolation and molecular identification of Nontuberculous Mycobacterium (NTM) from fish during the period between October and December 2017 from Karbla province, Iraq. This study included 200 fresh fish samples from four different species including Spondyliosoma cantharus, Liza abu, Carassius carassius and Cyprinuscarpio. Three samples of each fish were taken including gills, muscles and all internal organs. The samples were processed by decontamination, concentration of 4% sodium hydroxide, and 0.1 ml of sediment was streaking on Löwenstein Johnson (LJ) media; then the bacterial cultures were incubated at 28-30 °C for 3days up to 4 weeks and suspected colonies were stained with acid fast stain to confir
... Show More