Background: Multiple sclerosis is a chronic autoimmune inflammatory demyelinating disease of the central nervous system of unknown etiology. Different techniques and magnetic resonance image sequences are widely used and compared to each other to improve the detection of multiple sclerosis lesions in the spinal cord. Objective: To evaluate the ability of MRI short tau inversion recovery sequences in improvementof multiple sclerosis spinal cord lesion detection when compared to T2 weighted image sequences. Type of the study: A retrospective study. Methods: this study conducted from 15thAugust 2013 to 30thJune 2014 at Baghdad teaching hospital. 22 clinically definite MS patients with clinical features suggestive of spinal cord involvement, patients were imaged with sagittal short tau inversion recovery sequences and sagittal T2 weighted. Results: The mean age of the patients was 32.5 ± 6.7years; female to male ratio was 2.7:1. The total number of spinal cord MS lesions was 44 of them 86.4% in the cervical spine, 68.2%of the lesions had less than one vertebra extension,79.6% of the lesions did not show changes in the spinal cord morphology. There was a significant upgrading in the lesions conspicuity at short tau inversion recovery sequence comparing to T2 weighted image, P<0.001. A significant difference had been found in artifact grading between both sequences; P<0.001. Conclusions: short tau inversion recovery magnetic resonance image sequences improve detection of MS spinal cord plaques compared with T2 weighted image and itincreasesthe conspicuity of the visualized T2weighted image lesions, but also it accentuates theartifacts more than T2weighted image.
E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas
... Show MorePraise be to God, Lord of the Worlds, who has made His way for His servants who know in the depths and who are devoted to Him at all times and times, so He has delivered to Himself their pain from two exiles, and His prayers and peace are the perfect trust in the presence of the pearl of charity of existence. Possessor of great intercession and praiseworthy status until the day of meeting and eternity, and upon his family and companions, the people of tomorrow, steadfastness, generosity, and generosity, and after that
For a long period of time, I have been asking myself: Why did he attack so many contemporary books, especially Sufism? Why this unlimited financial expenditure on printing, binding, beautifying and enticing readers?
... Show MoreThe steel jetty selected for strengthening is in Baghdad city, over Tigris River, consists of 55 short spans, each of approximately 4 meters and one naviga-tional opening of 12 m. The bridge is 224 meters length and 8 meters in width. The strengthening system was designed to remove overstresses that occurred when the bridge was subjected to abnormal loads of 380 tons. A strengthening system which installed in spring 2008 was used where the main concept is to depend on added side supporting elements which impose reversal forces on the bridge to counteract most of the loads expected from the abnormal heavy loads. The bridge was load tested before and after the strengthening system was activated. The load test results indicate that the strengt
... Show MoreThis paper presents an experimental study for strengthening existing columns against axial compressive loads. The objective of this work is to study the behavior of concrete square columns strengthening with circulation technique. In Iraq, there are significantly more reinforced rectangular and square columns than reinforced circular columns in reinforced concrete buildings. Moreover, early research studies indicated that strengthening of rectangular or square columns using wraps of CFRP (Carbon Fiber Reinforced Polymer) provided rather little enhancement to their load-carrying capacity. In this paper, shape modification technique was performed to modify the shape (cross section) of the columns from square columns into circular colu
... Show MoreThe Harmonic Oscillator (HO) and Gaussian (GS) wave functions within the Binary Cluster Model (BCM) were employed to investigate neutron, proton and matter densities of the ground state as well as the elastic proton form factors of one neutron 8Li and 22N halo nuclei. The long tail is a property that is clearly shown in the neutron density. The existence of a long tail in the neutron densities of 8Li and 22N indicates that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section of these nuclei were calculated using the Glauber model.
The aim of current study is to analyze the content of intermediate stage biology books based on multiple intelligences. To do this, the researcher used the descriptive analytical approach. To analyze the three books of the intermediate stage, the author adopted content analysis tool and area unit. They were exposed to group of experts in methods of teaching biology, and measurement and evaluation. The findings of the study have shown a significant difference between what was expected and the observation of the multiple intelligences for the three biology books excluded the (social, musical, and kinetic intelligence), and there is no significant difference between the analysis' result of the biology books and the expectations of b
... Show MoreA true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
Objectives To determine the prevalence of oral lesions by age and gender among the pediatric population in Iraq. Materials and methods A review of the archives of the oral pathology department of Baghdad University from, 1970 Materials and Methods: A review of the archives of the oral pathology department of Baghdad University from 1970 to 2013 for all biopsies from children aged 0–15 years old. Results A total of 1286 child specimens represented 11.98% of all biopsied lesions. The pyogenic granuloma was the most frequent lesion in children, and the periapical cyst was the most frequent lesion from an odontogenic origin. The incidence of malignant lesions was higher in the 0–3 age group than other groups. Conclusions The majority of les
... Show More
|
A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the
... Show More