In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.
In this search, a new pyrophosphate technique was proved. The technique was employed to single- nucleotide polymorphisms (SNPs), which diagnosis using a one-base extension reaction. Three Mycobacterium tuberculosis genes were chosen (Rpob, InhA, KatG) genes. Fifty-four specimens were used in this study fifty-three proved as drug-resistant specimens by The Iraqi Institute of Chest and Respiratory Diseases in Baghdad.; also one specimen was used as a negative control. The steps of this technique were by used a specific primer within each aliquot that has a short 3-OH end of the base of the target gene that was hybridized to the single-stranded DNA template. Then, the Taq polymerase enzyme and one of either α-thio-dATP, dTTP, dGTP, or dCTP
... Show MoreThe aim of the research is to present and discuss the subject of the budgeting estimates and how to activate the role of the Federal board of supreme audit in examining these estimates through reference to Articles 6 and 10 of the Federal board of supreme Law, which did not restrict Federal board of supreme in Preventive control on examination process for planning which is prepared from the government units, as the result of a large amount of government units Provisions and the weakness of estimates in most of its items, which rely on personal assessment and not based on scientific and logical basis of the estimate, which leads to the emergence of a deficit is not true in the general budget and this seems clear in most Iraq
... Show MoreThe nonlinear optical properties response of nematic liquid crystal (6CHBT) and the impact of doping with two kinds of nanoparticles; Fe3O4 magnetic nanoparticles and SbSI ferroelectric nanoparticles have been studied using the non-linear dynamic method through z-scan measurement technique. This was achieved utilizing CW He-Ne laser. The pure LC and magnetic LC nanoparticle composite samples had a maximum absorption while the ferroelectric LC nanoparticle composite had a minimum absorption of the incident light. The nonlinear refractive index was positive for the pure LC and the rod-like ferronematic LC composite samples, while it was negative for the ferroelectric LC composite. The studying of the nonlinear optical
... Show MoreConsequence of thermal and concentration convection on peristaltic pumping of hyperbolic tangent nanofluid in a non‐uniform channel and induced magnetic field is discussed in this article. The brief mathematical modeling, along with induced magnetic field, of hyperbolic tangent nanofluid is given. The governing equations are reduced to dimensionless form by using appropriate transformations. Exact solutions are calculated for temperature, nanoparticle volume fraction, and concentration. Numerical technique is manipulated to solve the highly non‐linear differential equations. The roll of different variables is graphically analyzed in terms of concentration, temperature, volume fraction of nanoparticles, axial induced magnetic fie
... Show MoreMaking the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR