استخدام سلاسل ماركوف في التعرف على تعقبات الحامض النووي DNA
serum amylase occurs in cases of perforated peptic ulcer partly as a result of increase leakage of pancreatic enzymes rich fluid from the perforation site with subsequent absorption by peritoneal lymphatics & partly due to damage of pancreases by digestive enzymes that spilled through the perforation.
Objectives: To determine the significance of abnormally high level of serum amylase in patients undergone operation for PDU, to study the factors that tend to bring about elevated serum amylase level in these patients.
Patients and Methods: A prospective study of 250 patients with perforated duodenal ulcer (PDU) at al kindy teaching hospital, Baghdad, Iraq from June 2008- august 2010. patients were examined clinically and investig
The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThe investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .
&nb
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreBack ground: Celiac disease (CD) is an immune–mediated enteropathy induced by gluten with broad spectrum of presentation, many patients with atypical symptoms or clinically silent remain undiagnosed, and are at risk of long-term complications.
Objective: The aim of the present study is to determine the of prevalence celiac disease in children with short stature.
Patient and Methods: In this prospective study, 307 children 181(58.9%)males and 126(41.1%) females ,with ages ranging from 3 to 17.5years ( mean 12.2 ±3.4) with short statures (height below 3rd percentile adjusted for age and sex) attending the consultation room of endocrinology/ Welfare Teaching Hospital/medical city- Baghdad , were enrolled in this study from the firs
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreBackground: Lenalidomide is an immunomodulatory drug having notable anti-inflammatory, and anti-antineoplastic properties. Lenalidomide suppresses the production of pro-inflammatory cytokines that have been linked to a variety of hematologic malignancies. Lenalidomide enhances the immune system of the host by regulating T cell proliferation, which results in changes in inflammation that are related to the etiology of psoriasis.
Objectives: The objectives of this study were to determine the efficacy of lenalidomide as an ointment in treating mouse models of psoriasis as well as how it may affect TNF-α levels in skin tissue in different experimental groups.
Methods: The stud
... Show MoreSatire is genre of the literary arts that has always been the source of human interest. Because it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at
... Show MoreIn this study, different methods were used for estimating location parameter and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment estimation (ME),and approximation estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile as estimation for distribution f
... Show More