The effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.
The diversity of cultures is still the title of an Iraqi specificity that gave the society a diversity and this is reflected in the journalistic reality with the changing of the political system generate a new political and ideological life that differs from what is prevailed during the decades. However, its exacerbation of the degree of division is an additional duty for the press as a cultural platform and a knowledge bridge that contributes to the process of dialogue, addressing the differences, establishing a politically homogeneous structure through the state and socially by uniting all components of society and working to raise public awareness of the importance of national belonging to build a modern state. Cultural diversity is a
... Show MoreAbstract
The study aimed to identify the expansion in granting credit to Iraqi banking institutions and its impact on the financial position of Iraqi banks in terms of revenues, profits, expenses and property rights in banks, as the expansion in granting bank credit will correspond to an increase or decrease in some items of the balance sheet and the financial position of banks, so the problem of the current study It will be determined through whether the expansion of granting bank credit will affect the financial position of Iraqi banks or not by studying the selected research community of the 10 Iraqi banks listed in the Iraq Stock Exchange, The research sample included the u
... Show MoreUnmanned aerial vehicles (UAVs) can provide valuable spatial information products for many projects across a wide range of applications. One of the major challenges in this discipline is the quality of positioning accuracy of the resulting mapping products in professional photogrammetric projects. This is especially true when using low-cost UAV systems equipped with GNSS receivers for navigation. In this study, the influence of UAV flight direction and camera orientation on positioning accuracy in an urban area on the west bank of the Euphrates river in Iraq was investigated. Positioning accuracy was tested in this study with different flight directions and camera orientation settings using a UAV autopilot app (Pix4Dcapture software
... Show MoreBackground: Preeclampsia occurs in 3-5% of
pregnancies and is a major cause (12-20 %) of
maternal mortality in developed countries. It is the
leading cause of preterm birth and intra-uterine
growth restrictions (IUGR).
Objective: The study was designed to determine and
demonstrate the ultra structural changes of
endothelial cells in placenta of women suffering from
hypertensive disease.
Patients & Methods: Placental samples were
obtained from two groups of pregnant women
groups (preeclamptic and normal pregnant women).
The specimens were fixed in 2.5% gluteraldehyde
and preceded for electron microscopic examination.
Results: Placenta of women with preeclampsia has
shown marked degenerative
Dissolution of gypsum rock in water is significant, which may result in hydrocarbon reservoir formation and evaporate deposits. However, the complexity of the gypsum dissolution process is still of interest because of its uncleanness that requires more critical analysis. The objectives of this experimental study are emphasis on the dissolution characteristics of gypsum rock under room temperature and by various types of water; namely: deionized, tap, fresh, acidic, well, and normal rainwatre. In addition, the influences of dissolution on gypsum rock's mechanical and physical characteristics. Gypsum rock was obtained from Agjalar area, in the southwest of Sulaymaniyah city, Northern Iraq. Experimental results show that we
... Show MoreProtection study of the corrosion behavior of Copper surface was conducted with several concentrations of drug. Experimentally, voltammetric measurements were used to check the inhibition eciency (% IE) in saline solution of 3.5% NaCl. The results showed an increase in the inhibition eciency with increasing the concentration of the drug was 95.90%. Theoretical treatment of the drug in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (1H°f), binding energy (1Eb), and total energ
Due to its various resistance mechanisms, Pseudomonas aeruginosa is the most prevalent opportunistic infection that kills hospitalized patients. Thus, therapeutic options become limited. Objective: The study aimed to estimate the antibiofilm effectiveness of Conocarpus erectus leaf extracts against MDR P. aeruginosa isolates and examines pelA and algD gene expression. Subjects and Methods: One hundred-fifty clinical samples were collected from five Baghdad hospitals between September 2021 and January 2022. Samples were grown on different mediums. Despite cetrimide agar's ability to detect P. aeruginosa, only 83 isolates developed at 42°C. VITEK 2 compact system identification followed. This study examined 83 of P. aeruginosa isolates for r
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables