research centers


Search results: Found 181

Listing 1 - 10 of 181 << page
of 19
>>
Sort by

Article
Photo – Histometry A Modified Computer Assisted Morphometric Measurement Program

Authors: Zaid A AL-Madfai --- Huda M AL- Kateeb*
Journal: Journal of the Faculty of Medicine مجلة كلية الطب ISSN: 00419419 Year: 2007 Volume: 49 Issue: 1 Pages: 135-137
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

A promotion to a previous computer programmed technique "Photo-Micro Estimation Program" wascarried out to compute the exact dimensions of cell and cell fraction in photographs ofhistological sections. "Visual Basic 6" was used as a language for building of the antecedentapplication forms. With the aid of a slide micrometer, pixels were substituted for micrometer(μm). The new procedure was termed "Photo-histometry program".To test the suitability of this program, eight photographs of histological sections were selectedrandomly to be tested. Results were contrasted with those calculated by using ocular lens(calibrated by a slide micrometer).Estimation of RBC diameter (well known, =7-8 μm) was the second step in assessing theadequateness of this new program.Results revealed that this program was simple, fast, adequate and accurate. It was better than thecalibrated ocular lens in being more precise (it enumerates up to the fractions of a micrometer)


Article
Relapse Tendency among Different Types of Malocclusion

Author: Afrah K Al-hamdany
Journal: Al-Rafidain Dental Journal مجلة الرافدين لطب الأسنان ISSN: 18121217 Year: 2012 Volume: 12 Issue: 2 Pages: 218-228
Publisher: Mosul University جامعة الموصل

Loading...
Loading...
Abstract

The aim of this study is to evaluate the post-treatment changes in the dental parameters measured at study models in group of Iraqi patients with different Angle's classes of malocclusions. Materials and Methods: 113 Iraqi patients (42 males and 71 females) ,of 14-29 years old at beginning of treatment, were randomly selected and longitudinally assessed in respect to relapse of their orthodontically treated dentitions. Stone study models were taken before treatment, after orthodontic treatment and a third set was obtained approximately 1 month out of retention. Study models were photographed using a digital camera which is mounted on a height-adjustable tripod; with standard camera to object distance. Indirect computer digitization is used; in which the photographs are entered to memory of Pentium IV computer and analyzed using View Box version 3 software allowing data to be directly digitized in the computer and analyzed with the SPSS program.10 variables are digitized :labial seg-ment ,buccal segment, vertical canine, vertical molar, diagonal arch length, inter canine width, inter-molar width, inter molar width, over bite and over jet. Changes in measurements on study models from (before treatment) to (after treatment) were calculated and Paired Student's t- tests were employed to test the changes in means from (after treatment) to (after retention); at P=<0.05 Results: The pooled sample was divided according to Angle's classifications into groups, the results indicate that the changes are varied and ranged from statistically non significant for some variables to significant for the rest. While for Class I crowding patients; the changes are small and statistically non significant for most variables. For Class I spacing patients; a tendency for relapse for most variables were observed. In Class II. D1 crowding, Class II. D1 spacing, Class II. D1 without crowding or spacing, CII. D2 and Class III crowding patients some variables showed significant changes, and no significant difference for rest of variables. Conclusion: Relapse (post-treatment changes) in the dental parameters measured at study models varied among different Angle's classes of malocclusions at the 1-month follow-up. Class I crowding and CII.D1 without crowding or spacing subjects were relatively stable after treatment. Class II.D2; Class I spacing and Class II.D1 spacing subjects were relatively prone to relapse post treatment.

Keywords

computer --- relapse --- retention


Article
The Effect of Computer Technology in Teaching Material of Pysiology for Second Year Students at Department of Physical Education and Sport Sciences
اثر تقنيات الحاسوب في تدريس مادة الفسلجة لدى طلبة المرحلة الثانية قسم التربية البدنية وعلوم الرياضة

Author: Amal Sabeh Salman / Ammar Ashur Khalaf أمال صبيح سلمان / عمار عاشور خلف
Journal: Al-Fatih journal مجلة الفتح ISSN: 87521996 Year: 2017 Volume: 13 Issue: 70 Pages: 67-76
Publisher: Diyala University جامعة ديالى

Loading...
Loading...
Abstract

The researcher dealt with the importance of educational technology and using computer in process education and huge development which happened. Many technologies appeared among modern technologies like computer. It opened the path for the teacher to educational means that help to increase the level of learning in Universities. The problem of the current study represents the necessity of using modern educational means which arouses the motive of students and their interests and prepares the opportunities of cooperation and play a positive active role. The research aims to identify the effect of computer technology and choosing the method of teaching for physiology material. The hypothesis of the research shows that there is a statistical difference which is significantly intangible between pre-test and post-test for the experimental group and for the favour of the post-test. The researcher dealt with the theoretical study of research and used the experimental method for being suitable for the subject and aims of research. A sample has been chosen (39 students). The researcher used system design for individual group having pre-test and post-test as being suitable for the aims of research. After implementing and discussions the researcher reached to the following conclusions and recommendations:-Conducting more studies by using modern educational technologies.-Encouraging to conduct modern educational programs in the area of modern technology to develop the educational process.The researcher recommended the following:-The teachers interest in using modern technology in process of education and supporting them.-Trying to save and store the lectures of studying materials in Universities so that students will be able to study them by using computers.

تناول الباحثان اهمية التقنيات التربوية واستعمال الحاسوب في العملية التعليمية والتطورات التي حدثت والتقدم التكنولوجي الكبير أذ برزت العديد من التقنيات الحديثة ومنها الحاسوب فقد فتح المجال للمدرس من اختيار الوسيلة التعليمية التي تساعد على رفع المستوى التعليمي في الجامعات . وتتمثل مشكلة الدراسة الحالية في ضرورة استعمال الاساليب التربوية الحديثة التي تثير دافعية الطلبة واهتمامهم وتهيء لهم فرص التعاون والقيام بدور ايجابي نشط . ويهدف البحث الى التعرف على تاثير تقنيات الحاسوب واختيار نوع طريقة التدريس لمادة الفسلجة . وفرضية البحث هي وجود فرق احصائي ذو دلالة معنوية بين الاختبار القبلي والبعدي للمجموعة التجريبية ولصالح الاختبار البعدي . وتناول الباحثان الدراسات النظرية لموضوع البحث . واستعمل الباحثان المنهج التجريبي لملاءمة موضوع البحث واهدافه وتم اختيار العينة بالطريقة العمدية والبالغ عددها (39) طالب وقد استعمل الباحثان نظام تصميم المجموعة الواحدة ذات الاختبارين القبلي والبعدي الاكثر ملاءمة لأهداف البحث . وبعد تطبيق الاختبارات على عينة البحث من اجل الحصول على النتائج لعرضها وتحليلها ومناقشتها ، وقد توصل الباحثان الى الاستنتاجات والتوصيات وهي :-اجراء المزيد من الدراسات باستعمال التقنيات التربوية الحديثة في التعليم .-التشجيع على اقامة برامج تعليمية حديثة في مجال تكنولوجيا التعليم لتطوير العملية التعليمية .وقد اوصى الباحثان : -ضرورة عناية المعلمين باستعمال التقنيات الحديثة في عملية التعليم وتقديم الدعم لهم .-محاولة تخزين وحفظ المحاضرات لبعض المواد الدراسية في الجامعات ليتكمن الطلاب من دراستها عن طريق الحاسوب .


Article
Cervical Spondylosis among Group of Computer Users in Erbil City
داء فقار العنق بين مجموعة مستخدمي الكمبيوتر في مدينة أربيل

Authors: Zekra Ali Aziz --- Dashty Abbas Al-Bustany
Journal: Zanco Journal of Medical Sciences مجلة زانكو للعلوم الطبية ISSN: 19955588/19955596 Year: 2009 Volume: 13 Issue: 2 Pages: 28-36
Publisher: Hawler Medical Univeristy جامعة هولير الطبية

Loading...
Loading...
Abstract

Background and Objectives: Neck pain due to poor posture, if neglected for long time, can lead to development of the cervical spondylosis. This study was designed to analyze the relation between symptoms and signs originating from the cervical spine and the duration of computer use.Methods: A comparison of a group of male subjects who work on computer with those who do not work on computer whose ages range between (30 - 50) years was done for liability of cervical spondylosis. Any subject whose BMI is more than 25Kg/m2 was excluded. Likewise any subject with recognized evidence for predisposition to develop spondylosis was excluded.Employee from different establishments in Erbil City (200 Subjects), over a period of six months from January / 2008 were included in the study.Ninety nine subjects who use computer and hundred and one non-computer user. Subjects were subdivided into: First group: Computer user. Second group: Non-computer user. In both groups the duration of occupation ranges between four to sixteen year and hours of working/week range between (22-32 hours). The (99) subjects who work on computer each of them was evaluated for computer work station and asked about his posture during use of computer and asked if he takes a break time when he work for long hours.The difference between comparable subdivisions of the studied subjects was tested by the Chi-square test concerning the frequency of spondylosis in each of them.Results: Cervical spondylosis was statistically significant among those who use computer (P< 0.05).Conclusions: Long term use of computer with bad posture and with out break time increase liability for developing cervical spondylosis in comparison of (same age group, same duration of occupation ,and same hours of working) but not using computer. Proper posture and take a break time when using computer for long time is necessary.


Article
Microbial Contamination Associated with Computer Keyboards and Mouse Devices in Diyala University

Authors: Abdul-Razak Shafiq Hasan --- Shaima'a Rahem Hussien --- Zainab H. Al-Azawi --- Reham Asa'd
Journal: Diyala Journal of Medicine مجلة ديالى الطبية ISSN: 97642219 Year: 2015 Volume: 8 Issue: 1 Pages: 66-72
Publisher: Diyala University جامعة ديالى

Loading...
Loading...
Abstract

Background: Surface contamination of public user interface systems such as computer keyboards and mouse devices may play a role in community-acquired outbreaks by acting as an environmental vehicle in transmission of potential hazardous microorganisms. There is no economical way to test all keyboards and mice out there, but there is a common-sense way to prevent bacterial contamination or eliminate it if it exists.Objectives: To explore the bacterial contamination rates in multi-user and single-user computer accessories (keyboards and mouse devices) in certain colleges of the Diyala University.Materials and methods: This study was conducted in Bacteriology laboratory- Colleges of Veterinary Medicine- Diyala University for the period from October 2012 to April 2013. A total of 155 swabs were collected aseptically from 60 computers in 4 colleges, namely, College of Medicine, Veterinary Medicine, Science, and Education- Pure Science. Swabs were streaked on blood and MacConkey's agar plates then incubated for 24 hours at 37 ̊ C. Final identification of bacterial species was based on standard bacteriological and biochemical criteria.Results: The results showed that the overall contamination rate in the four colleges was (54.8%). The highest isolation rate of bacterial contaminant was Staphylococcus epidermidis (30.6%), followed by Escherichia coli (29.4%). Fungi constitute (17.6 %) of isolates. The College of Veterinary Medicine rank at the top with significant highest contamination rate (52.7%), followed by the College of Medicine with a contamination rate (21.2). Computers of the internet centers harbor the significant highest contamination rate compared to administrative units (71.8% and 28.2%) respectively. The contamination rate was higher in mouse devices compared to keyboards (57.6% vs 42.3%).Conclusion: The study concluded that continuous education of students and employees about the risk of bacterial contamination arise from using the computers, beside the periodic disinfection of computer accessories may aid the fight against transmission and spreading of infectious pathogens.


Article
A QUANTUM IMPROVEMENT ON DIJKSTRA’S ALGORITHM FOR COMPUTER NETWORK ROUTING
تطوير كمي لخوارزمية Dijkstra لتحديد المسار في شبكات الحاسبات

Authors: Rana F. Ghani رنا فريد غني --- Ahmed T. Sadik احمد طارق صادق
Journal: Journal of university of Anbar for Pure science مجلة جامعة الانبار للعلوم الصرفة ISSN: ISSN: 19918941 Year: 2008 Volume: 2 Issue: 1 Pages: 186-194
Publisher: University of Anbar جامعة الانبار

Loading...
Loading...
Abstract

The aim of this paper is to improve the Dijkstra algorithm which is widely used in the internet routing. Quantum computing approach is used to improve the work of Dijkstra algorithm for network routing by exploiting the massive parallelism existing in the quantum environment and to deal with the demands of continuous growing of the internet. This algorithm is compared according to the number of iterations and time complexity with Dijkstra’s algorithm and the result shows that the quantum approach is better in finding the optimal path with better time complexity when it is implemented in quantum computer.

والتي تستخدم على نطاق واسع في تحديد Dijkstra الهدف من هذا البحث هو تطوير خوارزميةيتم عن Dijkstra مسار المعلومات في شبكات الحاسبات. استخدام الاحتساب الكمي في تطوير خوارزميةطريق استثمار الامكانية العالية للمعالجة المتوازية الموجودة في هذه الطريقة للاحتساب في البيئة الكميةللتعامل مع المتطلبات المتزايدة الناتجة عن التزايد في حجم شبكو الانترنيت.من ناحية عدد الدورات والتعقيد الوقتي Dijkstra الخوارزمية المقترحة تمت مقارنتها مع خوارزميةوالنتائج اثبتت افضلية الخوارزمية الكمية.


Article
information hiding using viruses

Author: saad hameed سعد حميد عبيد
Journal: Journal of Baghdad College of Economic sciences University مجلة كلية بغداد للعلوم الاقتصادية الجامعة ISSN: 2072778X Year: 2008 Issue: 16 Pages: 362-374
Publisher: Baghdad College of Economic Sciences كلية بغداد للعلوم الاقتصادية

Loading...
Loading...
Abstract

as we know that information hiding techniques are researched and used in different aspects and using different cover media to wrap the secret message or information inside it yet the usage of a computer virus as a cover media, host or a carrier is a little bit extreme.this is a paper that shows the most important things to concentrate on when hiding secret information into a virus regarding of the types and behavior of both the virus itself and the person monitoring the communication media or the stego-analyst knowing that the reaction of the antivirus is in the benefit of the secrecy of the information


Article
MIPS CPU DESIGN AND IMPLEMENTATION BASED CYCLONE II FPGA BOARD
تصميم وبناء معالج مبس مبنيا على نسق مصفوفة البوابات المبرمجة نوع سايكلون2

Author: Ibtesam R. K. Al-Saedi
Journal: Journal of Engineering and Sustainable Development مجلة الهندسة والتنمية المستدامة ISSN: 25200917 Year: 2016 Volume: 20 Issue: 2 Pages: 39-54
Publisher: Al-Mustansyriah University الجامعة المستنصرية

Loading...
Loading...
Abstract

The aim of this work is to design and implement a simple MIPS CPU by using Cyclone II FPGA without complex control unit. MIPS- Processor has been studied and realized to design, simulate and implement its components by using VHDL and FPGA Board under Quartus version “8.1 software packages. This design in a modern FPGA environment has done and used to finally realize the hardware components (RF, PC, ALU, RAM, ROM and Multiplexer). Also, the design has used a module principle to implement the components of the Microprocessor which provides high flexibility in expanding the hardware and software units of its components when there is a need to change the structure of the design without a complex central control unit. This method of design provides high flexibility especially for embedded systems which are planted in a variety of applications. The success of the design has been tested through the work of the processor as an integrated in all components under its instructions with simple control unit.

الهدف من هذا العمل تصميم وبناء نوع من المعالجات الدقيقة MIPS ( مليون ايعاز في الثانية) نوع RISC (الكومبيوترات ذات ايعازات مقننة) بدون وحدة سيطرة معقدة باستخدام Cyclone II FPGA Board. تم دراسة، تصميم، محاكاة وبناء هذا النوع من المعالجات الدقيقة باستخدام برمجيات محاكاة المكونات المادية VHDL ولجميع مكونات المعالج وبناء ايعازاته باستخدام منصة المحاكاة البرمجية المعروفة لهذا النوع من البرمجة 8.1 Quartus. صمم معالج المبس في بيئة حديثة لل FPGA وببرنامج المحاكاة الذي في نهايتة تم إدراك المكونات المادية لوحدات المعالج الأساسية (RF, PC, ALU, RAM, ROM و Multiplexer) باستخدام مبدأ الوحدات التركيبية (Module) التي استخدمت في التصميم و البناء حيث وفرت مرونة عالية عند تغيير او توسيع بنية التصميم او عند توسيع الوحدات المادية والبرمجية لمكونات المعالج حسب المهام المطلوبة و دون استخدام وحدة سيطرة مركزية معقدة . هذه الطريقة في التصميم ومن خلال توفير مرونة عالية في توسيع مهام محددة تجعلها مناسبة للانظمة المطمورة او والمزروعة Embedded Systems و لتطبيقات متنوعة . تم اختبار نجاح التصميم من خلال عمل المعالج كوحدة متكاملة بجميع مكوناته تحت جميع الايعازات بوحدة السيطرة البسيطة.

Keywords

MIPS --- Computer Architecture --- VHDL --- Simulation


Article
Design and Implementation of a Proposal Network Firewall

Authors: Walid K.Hussain وليد خالد حسين --- deah J.Kadhim ضياء جاسم كاظم
Journal: Al-Khwarizmi Engineering Journal مجلة الخوارزمي الهندسية ISSN: 18181171 23120789 Year: 2006 Volume: 2 Issue: 1 Pages: 52-69
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthorized Internet users from accessing private computers and networks connected to the Internet).
This paper concerned with the design and implementation of a proposal firewall system which is used to protect both individual computers and corporate networks from hostile intrusion coming through Internet. The Dual-homed host architecture has been used to implement the proposed firewall system. The designed system is constructed using Visual Basic 6.0 Language.Finally, This proposed system is built depending on the packet filtering mechanism to regulate all the packets entering and leaving the protected site using IP address and port number of the TCP packet. Also this system deals with application level and monitors all packet data (content) and maintains the firewall activity with Internet connection.

نتيجة التطور و النمو السريع في شبكات المعلومات و الانترنيت نظرا لأهمية الانترنيت في عالم اليوم لما يوفره من خدمات للمستخدمين من سهولة الحصول على المعلومات المختلفة بسرعة عالية وبأقل جهد ممكن , كل هذه الفوائد وغيرها ممكن ان تنقلب الى مضار خطيرة , اذ ان ارتباط الحاسبة الخاصة (Private Computer) او الشبكات المحلية (LAN) بالأنترنيت يفتح المجال امام هجمات القراصنة (Hackers) والدخلاء (Intruders) الذين يحاولون بطريقة ما ايجاد اي نقطة ضعف او منفذ للدخول عبر الانترنيت الى هذه الحاسبات لاغراض التجسس او لسرقة معلومات (كالتلاعب بالحاسبات المصرفية او معرفة كلمة سر وغيرها) او في بعض الاحيان لاغراض التخريب ليس الا . لذلك اصبح من المهم جدا ايجاد طريقة لحماية الشبكات ومستخدميها من مثل هذه التهديدات . واحدة من اهم طرق الحماية التي توفر درجة عالية من الامنية هي استخدام جدار النار (Firewall).يهدف هذا البحث الى تصميم وتنفيذ جدار ناري (Firewall) مفترض يستخدم لحماية الحاسبات الخاصة (Private Computer) والشبكات المحلية (LAN) من الاعداء المتطفلين خلال الانترنت.تم أستخدام معمارية الموطن المضيف المزدوج (Dual-homed host) في تصميم نظام الجدار الناري المقترح. النظام المقترح تم بناءه بأستخدام لغة الفيجول بيسك 6.أخيراً تم بناء هذا النظام المفترض بالاعتماد على استخدام ميكانيكية مرشح الحزم لتنظيم دخول وخروج جميع الحزم للموقع المحمي وذلك باستخدام عنوان الانترنت برتوكول (IP) ورقم البوابة (Port Number). وكذلك يتعامل هذا النظام مع مستوى التطبيق (Application Level) لمرقبة جميع محتوى حزم البيانات الداخلة من خلال تفعيل دور الجدار الناري عند الاتصال بالانترنت.


Article
Three Dimensional MHD Simulationof Comet Hale-Bopp Tail
محاكاة الماغنيتوهيدروديناميك ثلاثية الأبعاد لذيل المذنب هايل – بوب

Authors: Ahmed Abdul-Razzaq Selman أحمد عبد الرزاق سلمان --- Salman Zaidan Khalaf سلمان زيدان خلف
Journal: Baghdad Science Journal مجلة بغداد للعلوم ISSN: 20788665 24117986 Year: 2008 Volume: 5 Issue: 4 Pages: 581-592
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

The interaction between comet Hale-Bopp tail with the solar wind is investigated in the present paper using magneto-hydrodynamic (MHD) numerical simulation, which accounts for the presence of the interplanetary magnetic field (IMF). The simulation is based on three-dimensional Lax-Wendroff explicit scheme, providing second-order accuracy in space and time. The ions produced from the nucleus of the comet will add considerable effects on the microstructure of the solar wind, thus severely altering its physical properties. The present simulation focuses on careful analysis of these properties by means of simulating the behavior of the comet Hale-Bopp’s tail at 1 AU from the sun. These properties include the changes of the plasma density, particle velocity, IMF changes, pressure, and internal energy. The results indicated that comet tail will highly disturb the physical properties of the solar wind for a considerable distance. These changes reflect the effect of including the source term in the present simulation. It is shown that the comet tail will retain its original shape faster as it approaches the sun. Practical comparisons are also presented in the present research with earlier work. The present simulation was made using MATLAB program.

في البحث الحالي تمت دراسة التفاعل بين ذنب المذنب والرياح الشمسية باستخدام محاكاة رقمية تعتمد على نموذج الماغنيتوهيدروديناميك (MHD ) والذي يأخذ بنظر الاعتبار تأثير المجال المغناطيسي ما بين الكواكب (IMF ). هذه المحاكاة تعتمد على طريقة لأكس-ويندروف لثلاثة أبعاد، والتي توفر دقة من المرتبة الثانية في الفضاء والزمن. أن الايونات المتولدة من نواة المذنب ستضيف تأثيرا مهما على التركيب الداخلي للرياح الشمسية، ولذلك سيحصل تغير كبير على الخواص الفيزيائية لتلك الرياح. المحاكاة الحالية تدرس تلك التغيرات بعناية عن طريق محاكاة التفاعل بين ذيل المذنب هايل-بوب على مسافة وحدة فلكية واحدة من الشمس. هذه الخواص تشمل الكثافة الأيونية، سرعة الجسيمات، المجال المغناطيسي، ضغط البلازما والطاقة الداخلية. بينت النتائج بوضوح أن التغير الحاصل في مواصفات الرياح الشمسية يستمر لمسافات كبيرة. هذه التغيرات أوضحت التأثير المهم لتضمين وجود المصدر الأيوني في النموذج الخاص. أظهرت النتائج أن الرياح الشمسية تستعيد معظم خواصها الأولية على مسافات كبيرة من نواة المذنب. أيضا تمت مقارنة نتائج البحث الحالي مع بحوث سابقة. المحاكاة الحالية تمت باستخدام برنامج الماتلاب.

Listing 1 - 10 of 181 << page
of 19
>>
Sort by
Narrow your search

Resource type

article (153)

journal (28)


Language

English (92)

Arabic (44)

Arabic and English (16)


Year
From To Submit

2019 (14)

2018 (13)

2017 (5)

2016 (12)

2015 (9)

More...