Background/Aim: Endometrial abnormalities represent a diagnostic challenge due to overlapping imaging features with normal endometrium. Aim of this study was to assess accuracy of dynamic contrast-enhanced and diffusion-weighted magnetic resonance imaging (MRI) in evaluation of endometrial lesions in comparison with T2 and to assess local staging validity and degree of myometrial invasion in malignancy. Methods: Forty patients with abnormal vaginal bleeding or sonographic thickened endometrial were recruited. MRI examination of pelvis was per-formed using 1.5 T scanner with a pelvic array coil. Conventional T1-and T2, dynamic contrast-enhanced (DCE) sequences and diffusion-weighted image (DWI) were performed. Results: Mean age of patients was 53.2 years and 60 % of patients COM-plained of post-menopausal bleeding. Irregular margin, type III enhancement curve, a high signal in T2WI and DWI and low signal of apparent diffusion coefficient (ADC) were significantly associated with malignancy. The optimum ADC threshold value for distinguishing benign from malignant endometrial lesions was 0.905 × 10 -3 mm 2 /S, with 95.5 % sensitivity and 92.9 % specificity. DWI was most sensitive to malignant endometrial lesions, followed by DCE (89.6 %, 98.4 %) and T2 (86.7 %, 91.4 %). DWI and DCE staging correlated with FIGO staging (p = 0.0001 and p = 0.019, respectively). DWI had the best sensitivity for myometrial invasion (95.6 %), followed by DCE (91.9 %) and T2WI (90.1 %). All three sequences had 89.7 % specificity. Conclusion: DWI and DCE MRI were superior to conventional MRI at distinguishing malignant from benign endometrial lesions and can improve myometrial invasion depth evaluation and therapy planning when COM-bined with morphological T2WI. ADC cutoff at a high b value improved MRI diagnostic sensitivity and specificity.
By optimizing the efficiency of a modular simulation model of the PV module structure by genetic algorithm, under several weather conditions, as a portion of recognizing the ideal plan of a Near Zero Energy Household (NZEH), an ideal life cycle cost can be performed. The optimum design from combinations of NZEH-variable designs, are construction positioning, window-to-wall proportion, and glazing categories, which will help maximize the energy created by photovoltaic panels. Comprehensive simulation technique and modeling are utilized in the solar module I-V and for P-V output power. Both of them are constructed on the famous five-parameter model. In addition, the efficiency of the PV panel is established by the genetic algorithm
... Show MoreThis paper presents a vibration suppression control design of cantilever beam using two piezoelectric patches. One patch was used as an actuator element, while the other was used as a sensor. The controller design was designed via the balance realization reduction method to elect the reduced order model that is most controllable and observable. the sliding mode observer was designed to estimate six states from the reduced order model but three states are only used in the control law. Estimating a number of states larger than that used is in order to increase the estimation accuracy. Moreover, the state estimation error is proved bounded. An optimal LQR controller is designed then using the estimated states with the slid
... Show MoreIn this paper, chip and powder copper are used as reinforcing phase in polyester matrix to form composites. Mechanical properties such as flexural strength and impact test of polymer reinforcement copper (powder and chip) were done, the maximum flexural strength for the polymer reinforcement with copper (powder and chip) are (85.13 Mpa) and (50.08 Mpa) respectively was obtained, while the maximum observation energy of the impact test for the polymer reinforcement with copper (powder and chip) are (0.85 J) and (0.4 J) respectively
In current study, the dye from flowers petals of Strelitzia reginae used for the first time to prepare natural photosensitizer for DSSC fabrication. Among five different solvents used to extract the natural dye from S. reginae flowers, the ethanol extract of anthocyanin dye revealed higher absorption spectrum of 0.757a.u. at wavelength of 454nm. A major effect of temperature was studied to increase the extraction yield. The results show that the optimal temperature was 70 °C and there was a sharp decrease of dye concentration from 0.827 at temperature of 70 °C to 0.521 at temperature of 90°C. The extract solution of flowers of S. reginae showed higher concentration in acidic media, especially at pH 4 (0.902). The
... Show MoreProtection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie
... Show MoreAn experimental study was carried out to improve the surface roughness quality of the stainless steel 420 using magnetic abrasive finishing method (MAF). Four independent operation parameters were studied (working gap, coil current, feed rate, and table stroke), and their effects on the MAF process were introduced. A rotating coil electromagnet was designed and implemented to use with plane surfaces. The magnetic abrasive powder used was formed from 33%Fe and 67% Quartz of (250µm mesh size). The lubricant type SAE 20W was used as a binder for the powder contents. Taguchi method was used for designing the experiments and the optimal values of the selected parameters were found. An empirical equation representing the r
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More