This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreA total of 1346 hard ticks (863♂ and 483 ♀) infested 104 camels, 60 alive camels with 93.33% infestation rate and 44 carcasses of camels had 79.54% infestation rate The total infestation rate was 87.5 %. The current study results revealed ten species of hard ticks family Ixodidae Koch, 1844 related to genus Hyalomma as following: H. dromedarii Koch, 1844, H. schulzii Morel, 1969, H. turanicum Pomerantsev, 1946, H. excavatum Koch, 1844, H. truncatum Koch, 1844, H. scupense Schulzii, 1919, H. marginatum Koch, 1844, H. anatolicum Koch, 1844, H. rufipes Koch, 1844, H. impeltatum Schulze & Schlottke, 1930 from camel Camelus dromedarius Linnaeus, 1758 collected from 21 regions belonging to six provinces in middle, w
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreObjectives : The study aims to assessing nurses’ knowledge concerning peritonitis- dialysis association at the
peritoneal dialysis units, and to identifying the relationship between some nurses’ knowledge and some of their
demographic characteristic.
Methodology : A descriptive study was carried out at the peritoneal dialysis units in Baghdad Teaching
Hospitals started from November 29th 2004 to August 15th, 2005. A purposive sample of (52) nurses was
selected from Baghdad Teaching Hospitals. The data were collected through the use of constructed
questionnaire, which comprised of (97) items as an interview questionnaire technique as mean of data
collection. The reliability of the instrument was determined through
I found that it does not meet some of the requirements, including browsing and organizing structural elements, which is something in which the researcher found a scope for research, and from here she can formulate the problem of her research with the following question: Is there an actual need to develop user interface designs in the websites of Iraqi colleges of fine arts? The research included four chapters (the first chapter - the research problem - the second chapter (theoretical framework), which included three sections, the first is to identify the user interface, the second topic is the structural elements, and the third topic includes the rules of interface design and the dimensions of interaction), as well as the third chapter i
... Show MoreFlying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct
... Show More