The interaction of charged particles with the chemical elements involved in the synthesis of human tissues is one of the modern techniques in radiation therapy. One of these charged particles are alpha particles, where recent studies have confirmed their ability to generate radiation in a highly toxic localized manner because of its high ionization and short its range. In this work, We focused our study on the interaction of alpha particles with liquid water; since the water represents over 80% of the most-soft tissues, as well as, hydrogen, oxygen, and nitrogen ,because they are key chemical elements involved in the synthesis of most human tissues. The mass stopping powers of alpha particle with HଶO , COଶ, Oଶ, Hଶ and Nଶhave been calculated in energy range (0.001-1000) MeV, using four methods (Beth-Bloch equation, Zeigler formula and SRIM2013 software, ASTAR program).We have produced semi-empirical formulas for calculating the mass stopping power of alpha particles, for such targets by knowing alpha particle energy. Comparing our results of the calculated mass stopping power with ICRU- Report 49 we find very good agreement between them, this confirms the ability of our result to be used in such cancer treatment and other fields where this quantity is used.
After about twelve months or maybe more, some people can’t achieve pregnancy. This might be a sign of infertility as a reproductive system disease. The following study was carried out to investigate the DAZ 1 gene methylation level and its association with azoospermia in Iraqi patients. One hundred and fifty human blood samples were collected from from different regions in Baghdad governorate, including (private medicals Labs and the high institute for infertility diagnosis assisted reproductive techniques and Kamal Al- Samara'ay IVF Hospital) from both fertile and infertile men. The control group consists of 50 samples ranging from 22 to 51 years old, while the patient (infertile group) consists of 100 samples ranging between 25 and 51 y
... Show MoreThe current research dealt with (the deliberative dimension of the visual sign in the contemporary Iraqi poster) in an attempt to identify the importance of the contemporary poster and the role of the international dimension of the visual sign of exceptional importance.
What is the international dimension of the visual mark?
- What is the effect of the visual label on the contemporary Iraqi poster?
The current research aims to identify the pragmatic dimension in the contemporary Iraqi poster.
Across the temporal and spatial research boundaries of the year (2000-2020) in Iraq. The limits of the objective research The limits of this study on the pragmatics in the visual sign and the determination of the relationship betwee
Background: Studies show that diabetic patients have a higher incidence of ischemic stroke than non-diabetic patients. In the Framingham study the incidence of thrombotic stroke was 25 times higher in diabetic men and 36 times higher in diabetic women than in those without diabetes
Objectives: aim of this study to analyze topography in diabetic patients.
Type of study: Cross sectional study.
Methods: 48 patients with acute stroke were classified into 4 groups: euglycemic, stress hyperglycemia, newly diagnosed diabetics, and known diabetics.
Results:no significant differences were found in the type, site or size of st
... Show MoreTicks (Acari: Ixodidae) are ectoparasites that infest livestock in every geographic region of the world and are vectors of several viral, bacterial, and protozoan pathogens to both animals and humans. There is little information is available is about tick presence in Buffalo Bubalus bubalis (Linnaeus, 1758) (Artiodactyla, Bovidae) in Iraq. The current study determined the species of ticks parasitizing Buffalo in some central and southern regions included: Baghdad (Al Fathelia), Karbala (Al-Hussainia), Wasit (Kut and Al-Suwairah), Al-Qadisia (Al- Diwaniyah, Al- Saniya, Al-Mihnawea, and Afak), Thi Qar (Al-Nasiriyah and Al-chibayish), Missan (Amara and Qalaat Salih) and Basrah (Al-Haretha, Al-Madena and Al-Deer). A total of 150 Buffal
... Show MorePapillary thyroid carcinoma (PTC) represents the most prevalent kind of thyroid gland cancer, making up around 80% of all occurrences of thyroid cancer. Evidence shows that Syndecan-1 (SDC-1) expression is lost in a number of benign and malignant epithelial neoplasms, although its expression profile in thyroid gland neoplasms is yet unknown. Therefore, the aim of this study was to assess SDC-1 expression in papillary thyroid carcinoma patients, as well as the relationship between age and gender and SDC-1 expression. To undertake a detailed investigation of SDC-1 in normal and malignant tissues, tissue sections were used to examine SDC-1 expression in 70 tissue samples, 50 distinct PTC (6 males and 44 females) and 20 normal tissue ty
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More