Objective: Aimed to asses the role of PT estimation in early diagnosis and predicting the extent and the outcome of head injury with ICerH and/ or Contusion
Method :PT was measured by Digiclot 818
Group –1: One hundred consecutive head injured patients admitted at Neurosurgical and Al Ramadi teaching hospitals were initially estimated for prothrombin time and subsequently scanned
Group-2 : Two hundred twenty five consecutive non scanned head injured patients admitted to Neurosurgical and Al Ramadi teaching hospitals were estimated with prothrombin time at the time of insult and subsequently for the next two weeks Al – Kindy Col Med J 2012; Vol. 8 No. 1 P: 54
Clinical and neurological evaluation (GCS) score in addition to
Scheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy the
... Show MoreConstruction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
novel spectrofluorimetric flow injection analysis (FIA) method was developed for the selective quantification of ascorbic acid via fluorescence quenching of serotonin hydrochloride. The system employs a custom-designed photometric array comprising 16 irradiation sources arranged in a dual-axis matrix—eight aligned horizontally and eight orthogonally, enabling multi-angle excitation and enhanced spectral resolution. Fluorescence signals were captured using a twin-pair solar cell detector, offering high sensitivity and minimal optical interference. The method exhibited a linear calibration range of 0.1–30 limit of detection (LOD) of 0.025 μ μ g/mL with a correlation coefficient (r mol /L, equivalent to 4.403 * 10 4 μ 2 ) of 0.9966, a g
... Show MoreThe Imam Ibn al-Mundhir is likely in Shafi'i school. He has outlined some issues and disagreed with his doctrine. And that the vocabulary on which he relied on the weighting is correct and correct and I choose which I say. One of the most likely issues is the delay of Isha prayer to the darkness. And other issues simplified in the folds of research and study.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More