Symptoms of posttraumatic stress disorder are associated with various variables such as the exposure to traumatic events, sex and age. Such events could lead to negative cognitions towards self and the world. These cognitions, in turn, may lead to traumatic related disorders.
The present study aims to identify the percentage of traumatised individuals according to sex and age category variables. It also aims to assess the average of spreading symptoms of posttraumatic stress disorder of traumatised individuals according to sex and age category variables. Likewise, it aims to test variables significance in cognitions towards the world and the self according to the level of the spread of posttraumatic stre
... Show MoreObjectives: to assess the normal range of different lip parameters with gender difference and its role in esthetic procedures for Iraqi people. Methods: direct lip measurements were performed with closed lip position using a digital vernier caliper in 132 young Iraqi subjects (89 female and 43 male). Results: Lip measurements showed sexual dimorphism with higher value in men than women in six parameters. Cutaneous height of the upper lip was higher in both sexes. The mustache area in males was longer in males compared to females. Also, it was noticed that upper lip vertical thickness had a higher value, especially in subjects with cosmetic procedures. In addition to that, vertical upper lip thickness showed a higher rise in values
... Show MoreUnstable angina pectoris often leads to acute myocardial infarction. Since uric acid is thought to be risk factor for cardiovascular disease and considered a major antioxidant in human blood .The level of uric acid and lipid peroxidation in the sera of patients with unstable angina and myocardial infarction were measured and compared to the healthy individuals. Twenty-nine patients with unstable angina and twenty-nine patients with myocardial infarction were studied and compared to twenty-five healthy individuals. Uric acid was measured by using Human Kit. Malondialdelyde (MDA) a lipid peroxidation marker, was measured by thiobarbituric acid method .Significant elevation of uric acid and MDA were observed in the sera of pati
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b
The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show More