Back ground: Several devices with different physical bases have been developed for the clinical measurement of corneal thickness, they classified into 4 categories: Scheimpflug photography based, Slit –Scanning topography, optical coherence tomography (OCT) based and ultrasound (US) based.Objective:To evaluatethe precision of the new Scheimpflug –Placido disc corneal topography in measurement of corneal thickness and to compare the measured values with that obtained by US pachymetry.Methods: Setting of this study is Lasik center in Eye Specialty Private Hospital. Baghdad. Iraq.Eyes of healthy subjects were examined with the Sirius topography.3 consecutive measurements of central (CCT)and thinnest (TCT) corneal thicknesses were obtainedand the measurements repeated within 1 week. The within –subject standard deviation (Sw),test-retest repeatability ,coefficient of variation (CoV),and interclass correlation coefficient (ICC) were calculated to evaluate intra session repeatability and intersession reproducibility. For US pachymetry (Tomey-SP 100) only CCT was measured. Comparison ofthe measurements that obtained by the 2 devices done by paired t-test.Results: The topography provides high intrasession repeatability with test-retest and CoV close to 6μm and0.4%, respectively for both CCT and TCT. The inter session reproducibility also high with test-retest and CoV close to 8μm and 0.5%, respectively.ICC was higher than 0.97 for repeatability and reproducibility . Anarrow 95% limit of agreement was found between the pachymetry obtained by topography and US pachymetry measurements.Conclusions :The topography has been used showed high intrasession repeatability and intersession reproducibility of CCT and TCT measurements in healthy eyes .Absence of statistically significant differences suggest that the topography -TCT and the US pachymetry - CCT can be used interchangeably in subject with normal cornea.Financial Disclosure: No financial or proprietary interest in any material or method mentioned.
Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreVisceral leishmaniasis (VL) is a parasitic infection caused by an intracellular growth of Leishmania spp. in macrophage cells. The autoimmune disorder is a condition takes place when the immune system produces antibodies which incorrectly attacked its own body tissues. VL has been involved as an effect or on the autoimmune aspect. This study was conducted to identify the auto antibodies profile in patients infected with VL. The presences of auto antibodies in 21 Iraqi children infected with VL were tested for laboratory autoimmune aspect. The highest percentage of seropositive in Leishmania patients was observed for anti-ds DNA, anti-Mi-2, anti-Ku and anti-PCNA antibodies (90.5%, 90.5%, 90.5% and 61.9%) respectively, while the lowest percen
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
Research summary
Today, the Islamic nation is going through a phase that is one of the most dangerous that it has never experienced before. This phase was characterized by the following:
The nation is divided into states and its weakness in most of its doctrinal, political, social, economic and moral aspects.
Enemies targeting the nation's faith and capabilities, and the emergence of loyalty to the enemies of the nation from some groups of society, spreading misconceptions in the Muslim community.
Spreading the spirit of rebellion in all segments of society and striving to stir up the people against the rulers and put pressure on the rulers.
All these manifestations and others require the nation's wise men
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
Personal intelligence is thinking about an other person , understanding him, have sympathy and differentiation between people, and to appreciate their own point of view, with the sensitivity to their motives, behavior, and goals, so this intelligence involves dealing with a person or group of persons effectively and in normal or logical manner.
Emotions management is to achieve emotional balance by controlling the emotions continuously, self disciplining, keeping away from excitement sources, and dealing with bad situations in constructive way to achieve the psychological stability .
- the study aims
Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreBackground: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:
... Show More