Background: The skull offers a high resistance of adverse environmental conditions over time, resulting in the greater stability of the dimorphic features as compared to other skeletal bony pieces. Sex determination of human skeletal considered an initial step in its identification. The present study is undertaken to evaluate the validity of 3D reconstructed computed tomographic images in sex differentiation by using craniometrical measurements at various parts of the skull. Materials and Method: 3D reconstructed computed tomographic scanning of 100 Iraqi subject, (50 males and 50 females) were analyzed with their age range from20-70 years old. Craniometrical linear measurements were located and marked on both side of the 3D skull images. Results: For the all parameters measured for sexes the mean value for Male had significantly greater than females with (p value < 0.001). A receiver operating characteristic curves was obtained for each variable to observe their overall performance in sex determination. The area of mastoid triangle was found the best variable in sex differentiation (ROC area =0.97 for unilateral skull measurements and 0.98 for bilateral measurements).while EU-EU was found to be the least one. Conclusion: 3D reconstructed Computed tomography scanning is a good diagnostic method for analyzing the craniometrical measurements of sex determination. sex differentiation for isolated part of the skull when only the fragmentary crania is available, could be achieved and the highest accuracy in sex determination can be obtained whether part or complete skull available.
The research aims to detect the problems of educational reality faced by university professors and identify statistically significant differences in the academic problems of university instructors. It has adopted an analytical descriptive research approach to achieve research objectives and identifies the study community with professors of public and private universities. A random sample of 250 instructors was selected for the purpose of applying the questionnaire to them, knowing the academic problems encountered in the course of their work at universities, and adopting appropriate statistical means to process and analyze the data. The research concluded with a set of results, including that all fields (infrastructure, admission of
... Show MoreSemantic segmentation realization and understanding is a stringent task not just for computer vision but also in the researches of the sciences of earth, semantic segmentation decompose compound architectures in one elements, the most mutual object in a civil outside or inside senses must classified then reinforced with information meaning of all object, it’s a method for labeling and clustering point cloud automatically. Three dimensions natural scenes classification need a point cloud dataset to representation data format as input, many challenge appeared with working of 3d data like: little number, resolution and accurate of three Dimensional dataset . Deep learning now is the po
Three-dimensional (3D) image and medical image processing, which are considered big data analysis, have attracted significant attention during the last few years. To this end, efficient 3D object recognition techniques could be beneficial to such image and medical image processing. However, to date, most of the proposed methods for 3D object recognition experience major challenges in terms of high computational complexity. This is attributed to the fact that the computational complexity and execution time are increased when the dimensions of the object are increased, which is the case in 3D object recognition. Therefore, finding an efficient method for obtaining high recognition accuracy with low computational complexity is essentia
... Show MoreNeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among
This research delves into the role of satirical television programs in shaping the image of Iraqi politicians. The research problem is summarized in the main question: How does satire featured in television programs influence the portrayal of Iraqi politicians? This research adopts a descriptive approach and employs a survey methodology. The primary data collection tool is a questionnaire, complemented by observation and measurement techniques. The study draws upon the framework of cultural cultivation theory as a guiding theoretical foundation. A total of 430 questionnaires were disseminated among respondents who regularly watch satirical programs, selected through a multi-stage random sampling procedure.
Th
The research aims to employ one of the most important strategies for recovery from the crisis of the Covid-19 pandemic, which ravaged the economies of the entire world and its various sectors, including the banking sector, through financial technology that is based on digital transformation to achieve financial sustainability and the creation of innovative financial value chains in light of the decline in the banking sector as a result of The negative effects of the Covid-19 pandemic, be guided by the relevant international accounting standards to control the risks associated with financial technology. To recover from the Covid-19 crisis, the research came out with a set of recommendations, most notably financial technology from
... Show MorePeople with diabetes can develop different foot problems. In the blood stream glucose reacts with hemoglobin to make a glycosylated hemoglobin molecule called hemoglobin A1c or HbA1c, the more glucose in the blood the more hemoglobin A1c will be present in the blood. The HbAlc test is currently one of the best ways to check diabetes to be under control. The aim of study is to compare between the blood investigations which includes the fasting blood sugar and HbAlC (glycosylated hemoglobin), and to evaluate the benefit of HbAlc (measurement for diabetic patients with foot ulcer, to be a good indicator for controlling blood glucose). Sixty patients with type2 diabetes mellitus from the outpatient clinic of Baghdad Teachin
... Show MoreThis paper investigates a new approach to the rapid control of an upper limb exoskeleton actuator. We used a mathematical model and motion measurements of a human arm to estimate joint torque as a means to control the exoskeleton’s actuator. The proposed arm model is based on a two-pendulum configuration and is used to obtain instantaneous joint torques which are then passed into control law to regulate the actuator torque. Nine subjects volunteered to take part in the experimental protocol, in which inertial measurement units (IMUs) and a digital goniometer were used to measure and estimate the torque profiles. To validate the control law, a Simscape model was developed to simulate the arm model and control law in which measurem
... Show MoreThis paper introduces method of image enhancement using the combination of both wavelet and Multiwavelet transformation. New technique is proposed for image enhancement using one smoothing filter.
A critically- Sampled Scheme of preprocessing method is used for computing the Multiwavelet.It is the 2nd norm approximation used to speed the procedures needed for such computation.
An improvement was achieved with the proposed method in comparison with the conventional method.
The performance of this technique has been done by computer using Visual Baisec.6 package.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the cov
... Show More