Objective: This study aims to assess the efficacy of CT-guided true-cut biopsy as a less invasive and cost-effective diagnostic technique for peripherally placed lung lesions.
Objective: This study aims to assess the efficacy of CT-guided true-cut biopsy as a less invasive and cost-effective diagnostic technique for peripherally placed lung lesions. Methods: fourty patients with solitary lung nodule were involved in this study, true cut biopsies under Ct guide was taken then processed for routine H&E staining. Results: different pathological features can be identified with different pathological features giving primary diagnostic screening for lung cancer Conclusion: CT guided thoracic lesion biopsy is very efficient, cost-effective and less invasive technique when compared with the thoracic surgery
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreAW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
This study was conducted to test the hypothesis that the duration of time spent by the student inside the examination rooms answering the all kinds of written ex-amination questions has some kind of a positive effect on the final score he will get from that exam. And if there arc gender differences in this respect. Students and methods: Data on the final examinations of the autumn quarter was gathered on 892 examina-tions conducted at the end of this quarter , this included male participants of 566 and females of 326. Examinations were on twenty different subjects , including all of the first five years of the undergraduate students of Iraqi College of Medicine for the academic year 2002 — 2003 . The scheduled time of the examinations was
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreArchitecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction
... Show More