Background: Neural tube defects (NTDs) are said to be inherited in a multifactorial fashion, i.e. genetic-environmental interaction. Maternal nutritional deficiencies had long been reported to cause NTDs, especially folate deficiency during early pregnancy. More attention had been paid to the exact mechanism by which this deficiency state causes these defects in the developing embryo. The most significant of all researches was that connecting reduced folate and increased homocysteine level in maternal serum on one hand and the risk of developing a NTD baby on the other hand. Objectives : to determine the significance of homocysteine level in Iraqi mothers who gave birth to babies with NTDs as compared to normal controls. Patients, Materials
... Show MoreThe response of the combustor’s liner to the air-flow that passes through it is the key reason for the combustion chambers noise, hence the instabilities of those chambers that decreases the mechanical efficiency of such sections, by increased its mechanical vibrations, which increases the failure rate created during originating of the cracks spreading by the shakes producing by the series of high-level frequencies. Accordingly, any work debating the impact of the context of liners in the combustion chamber can provide grasping for the combustion noise generated by the undesirable vibrations, and benefits the industrial firms to design an ideal production procedure which increases the lifespan of the combustor. The goal of this work is
... Show MoreThe response of the combustor’s liner to the air-flow that passes through it is the key reason for the combustion chambers noise, hence the instabilities of those chambers that decreases the mechanical efficiency of such sections, by increased its mechanical vibrations, which increases the failure rate created during originating of the cracks spreading by the shakes producing by the series of high-level frequencies. Accordingly, any work debating the impact of the context of liners in the combustion chamber can provide grasping for the combustion noise generated by the undesirable vibrations, and benefits the industrial firms to design an ideal production procedure which increases the lifespan of the combustor. The goal of this wo
... Show MoreIn this research was to use the method of classic dynamic programming (CDP) and the method of fuzzy dynamic programming (FDP) to controlling the inventory in N periods and only one substance ,in order to minimize the total cost and determining the required quantity in warehouse rusafa principal of the ministry of commerce . A comparison was made between the two techniques، We found that the value of fuzzy total cost is less than that the value of classic total cost
Aluminum plasma was generated by the irradiation of the target
with Nd: YAG laser operated at a wavelength of 1064 nm. The
effect of laser power density and the working pressure on spectral
lines generating by laser ablation, were detected by using optical
spectroscopy. The electron density was measured using the Stark
broadening of aluminum lines and the electron temperature by
Boltzmann plot method it is one of the methods that are used. The
electron temperature Te, electron density ne, plasma frequency
and Debye length increased with increasing the laser peak
power. The electron temperature decrease with increasing gas
pressure.
Receipt date:3/13/2021 accepted date:5/26/2021 Publication date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
energy is one of the strategic resources within international politics, and this is through the existing competition between the international powers on it, and the global powers have begun to rely on interest in new areas, such as import, depending on new projects an
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More