In this paper, a fast lossless image compression method is introduced for compressing medical images, it is based on splitting the image blocks according to its nature along with using the polynomial approximation to decompose image signal followed by applying run length coding on the residue part of the image, which represents the error caused by applying polynomial approximation. Then, Huffman coding is applied as a last stage to encode the polynomial coefficients and run length coding. The test results indicate that the suggested method can lead to promising performance.
This presented study is to make comparison of cross sections to produce 71As, 72As, 73As and 74As via different reactions with particle incident energy up to 60 MeV of alpha 100 MeV of proton as a part of systematic studies on particle-induced activations on enriched Ge, Ga, Rb and Nb targets and neutron capture. Theoretical calculation of production yield, and suggestion of optimum reaction to produce 71As, 72As, 73As and 74As, based on the main published and approved experimental results of excitation functions were calculated.
Objective: the aim of this study is to determine the level of students' knowledge about the environmental health.
Methodology: The cross-sectional study was conducted at the College of Health and Medical Technology in Baghdad
city during the period from 1st march till 1st of July 2012. Data was collected by self-recording of a previously designed
questionnaire to obtain socio-demographic information such as (age, gender, department, year of grade).
Results: The highest rate of students were in the 2nd year followed by the 3rd year, highest rate of students had low
level of knowledge followed by intermediate level of knowledge, while lowest rate of students on had high level of
knowledge .Females had higher level of know
In this research, a low cost, portable, disposable, environment friendly and an easy to use lab-on-paper platform sensor was made. The sensor was constructed using a mixture of Rhodamine-6G and gold nanoparticles also Sodium chloride salt. Drop–casting method was utilized as a technique to make a platform which is a commercial office paper. A substrate was characterized using Field Emission Scanning Electron Microscope, Fourier transform infrared spectroscopy, UV-visible spectrophotometer and Raman Spectrometer. Rh-6G Raman signal was enhanced based on Surface Enhanced Raman Spectroscopy technique utilized gold nanoparticles. High Enhancement factor of Plasmonic commercial office paper reaches up to 0.9 x105 because of local surface pl
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreThe research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th
... Show MoreThis paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.
Background: The strategy for eliminating measles from Iraq includes conducting mass immunization campaign against measles, within the framework of the national strategic plan for the elimination of this disease. Awareness about this campaign is fundamental for their success.Objective: The study aims at finding out the knowledge, attitudes and practices regarding vaccination against measles among two groups of students in two different colleges ( medical and engineering) .To report uptake of Measles vaccine and reasons for declining the vaccine among medical and non-medical students in the campaignMethod: Across sectional study has been conducted at Al-Kindy College of Medicine/ Baghdad University and University of Technology for the peri
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreObjectives: This study aimed to assess patterns of coffee consumption among medical students at Al-Kindy College of Medicine, evaluate awareness of its benefits and adverse effects, and explore possible associations between caffeine intake and menstrual characteristics among female students.Methods: A descriptive cross-sectional study was conducted between November 2023 and February 2024 among 297 undergraduate medical students selected by convenience sampling. Data were collected through a validated, self-administered online questionnaire covering sociodemographic characteristics, coffee-drinking habits, perceived effects, and menstrual patterns. Descriptive and inferential analyses were performed using SPSS version 25. Association
... Show More