The diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced new system with high accuracy and low (FAR & FRR) as soon as possible.
Disease responses of eight wheat cultivars , Saber Beg. , Abu-Ghraib 3, Mexipak , Tamoz 2,Tamoz 3 , IPA 95 ,IPA 99 and Tahadi which were grown in four different sowing date , 25 th October , 19th September , 14th December and 8 January , to leaf rust disease caused by Puccinia recondita were investigated under natural infection conditions at the experimental farm , College of Agriculture , Abu-Ghraib, during the growing season of 1997-1998.Results of this study revealed that IPA 95, IPA 99 and Tahadi showed moderate resistant reaction, while Tamuz 3 was moderateley susceptable . Abu-Ghraib , Saber Beg, Tamuz 2 and Mexipak showed susceptible yeaction to the causal agent . The first sowing date was not suitable for disease progress in compars
... Show MoreMultiple sclerosis (MS) is a chronic disorder of the central nervous system (CNS) characterized by autoimmune inflammation, demyelination, and axonal damage. The present study aimed to shed a light on the contribution of interlukin-35 and its relation to some sex hormones in the pathogenesis of multiple sclerosis. Sixty six female patients with age range (20-40) years were taken from Baghdad Teaching Hospital through the period from Nov. 2012 to –April 2013 and 20 apparently healthy subject as control group matched age as group G1. The patients were divided into three groups depending on duration of MS diseases G2 from 3 months to 2 years, G3 from 2 years to 4 years, G4 from 4 years to 10 years and more. Investi
... Show MoreCeliac disease (CD) is an inflammatory small intestinal disorder that can lead to severe villous atrophy, and malabsorption . Since the measurement of α-amylase activity is the most widely used biochemical test for the diagnosis of pancreatic and non pancreatic disease , therefore serum α-amylase were studied in the present study in an attempt to evaluate the usefulness of this enzyme in the diagnosis of celiac disease and its relationship with anti gliadin IgA and IgG and serum glucose . Thirty one patients with celiac disease were studied and compared with twenty four healthy individuals . Significant elevation of α-amylase activity , glucose and anti gliadin IgA and IgG were observed in the sera of patients with celiac diseas
... Show MoreThe effect of mental and physical health on the feelings of subject welfare is known as health-related quality of life. The chronic obstructive pulmonary disease is a common respiratory diseases. Assessment of health-related quality of life is considered important in such chronic disease. The objective of the current study was to measure health-related quality of life in a sample of chronic obstructive pulmonary patients in AL- Diwanyia city/Iraq. This study was carried out on 150 already diagnosed COPD patients who attended to the Center of Respiratory Diseases/AL-Diwaniyah Teaching Hospital during September 2019 to January 2020. The Arabic version of St George’s Respiratory Questionnaire was used to asses
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreConclusion The observation of the phenomenon of structural evolution of the international system and its instability on a particular situation, by its transition from unipolar to polarity to bipolarism and then to unilateralism in the early 1990s led by the United States, and to the present moment, To say that the structure by which the hierarchy of superpowers or the regime is directed in terms of its various capacities that qualify it, and with the consent of the rest of the States directing the regime to lead and lead the world's first place, has no direct relation to the stability of this system, I hope other more influential in its stability. The structure of the new international order will be completely different in terms of the r
... Show MoreThis paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c