Preferred Language
Articles
/
Dxf01o0BVTCNdQwCRCZR
Assessment of the Healthy Women by Detection and Determination of Cells in Conventional Pap Stained Cervical Smear Images
...Show More Authors

Introduction: A Pap test can detect pre-cancerous and cancerous cells in the vagina and uterine cervix. Cervical cancer is the easiest gynecologic cancer to be prevented and diagnosed using regular screening tests and follow-up. This study aimed to estimate the cytological changes and the precancerous lesions using Pap smear test and visual inspection of the cervices of Iraqi women, and also to determine the possible relationship of this cancer with patients’ demographic characteristics. Methods: The study included 140 women aged (18-67) years old referred to the National Cancer Research Center (NCRC), Baghdad, Iraq, during the period 2011-2016. Both visual inspections of the uterine cervix and Papanicolaou smear screening were performed for all of the participants. Results: Only 14% of the women under study were in postmenopausal, and 86% were in premenopausal period. Visual inspection of the cervix showed that 48.6% of the women had erosion lesions. Upon cytology examination, 92.8% of the women showed non-specific inflammation, 70% revealed reactive squamous metaplasia, 27% had Koilocytotic atypia, and 17% suffered from cervical intraepithelial neoplasia (CIN1) or low grade squamous intraepithelial lesion (LGSIL). Contraception was used by 68% of those women, while 34.3% of them used pills. Most women, 79%, had multiple births. The abnormal vaginal discharge occurred in 34% of the participants that is why they attended the center compared with only 25.7% who came for routine checking. Finally, 67% of the participated women did not make this test previously. Conclusion: We conclude routine screening and Pap smear testing for uterine cervix and vagina might be useful especially for sexually active women for preventing the occurrence of precancerous and later cancerous lesions in these organs.

Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Petroleum Exploration And Production Technology
Re-assessment and tune-up gas condensate reservoir potential in Northern Iraq using material balance and reservoir simulation result techniques
...Show More Authors
Abstract<p>The main parameter that drives oil industry contract investment and set up economic feasibility study for approving field development plan is hydrocarbon reservoir potential. So a qualified experience should be deeply afforded to correctly evaluate hydrocarbons reserve by applying different techniques at each phase of field management, through collecting and using valid and representative data sources, starting from exploration phase and tune-up by development phase. Commonly, volumetric calculation is the main technique for estimate reservoir potential using available information at exploration stage which is quite few data; in most cases, this technique estimate big figure of reserve. In this study</p> ... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Archives Of Razi Institute
Assessment of Interleukin-13(rs20541) Genomic Polymorphism in Patients with Acute Respiratory Distress Syndrome in Relation to COVID19 Infection
...Show More Authors

Elevated Interleukin-13 (IL-13) may play an important role in the pathophysiology of COVID-19, yet, the attenuated response did not notice across all severe cases. Susceptibility to asthma in specific populations is associated with several SNPs of multifunctional cytokines, such as IL-13, IL-31 and IL-33. This prospective case-control study is designed to investigate the extent of genetic susceptibility in subsets of Iraqi patients with COVID-19 by targeting the variants of interleukin IL-13rs20541 polymorphism in relation to disease susceptibility and severity of clinical presentation. One hundred samples were obtained from the throat, nasopharyngeal and nasal swabs enrolled in this study. Eighty samples of the throat, nasopharyngeal and

... Show More
View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Mon May 13 2024
Journal Name
Journal Of Engineering And Applied Science
Assessment of using different ozone-friendly R22 alternative refrigerants in residential air conditioners in a high-ambient temperature country
...Show More Authors
Abstract<p>The performance of a vapor compression refrigeration system (VCRS)-based residential air conditioner operating in a high-ambient temperature (HAT) country was investigated using six zero-ODP (ozone depletion potential) refrigerants as replacements to R22. The non-flammable alternative refrigerants considered in the present research were R134a, R404A, R407C, R410A, R448A, and R507A. Using the basic conservation laws, the VCRS was modeled during steady-state operation and solved using engineering equation solver (EES) software. Coefficient of performance (COP), pressures and temperatures at compressor suction and discharge, Global Warming Potential (GWP), critical pressure and temperature, compressor </p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Effect of laser energy and ablation time on the formation of aluminum nanoparticles by nanosecond laser ablation of aluminum target in ethanol
...Show More Authors

In this work we study the influence of the laser pulse energy and ablation time on the aluminum nanoparticles productivity during nanosecond laser ablation of bulk aluminum immersed in liquid.
Aluminum nanoparticles were synthesized by pulsed laser ablation of Al targets in ethanol for 3-8 minutes using the 1064 nm wavelength of a Nd:YAG laser with energies of 300-500 mJ per pulse.The laser energy was varied between 300 and 500 mJ/pulse, whereas the ablation time was set to 5 minutes. UV-Visible absorption spectra was used for the characterization and comparison of products.

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimation of parameters of two-dimensional sinusoidal signal model by employing Deferential Evaluation algorithm and the use of Sequential approach in estimation
...Show More Authors

Estimation the unknown parameters of a two-dimensional sinusoidal signal model is an important and a difficult problem , The importance of this model  in modeling Symmetric gray- scale texture image . In this paper, we propose employment Deferential Evaluation algorithm and the use of Sequential approach to estimate the unknown frequencies and amplitudes of the 2-D sinusoidal components when the signal is affected by noise. Numerical simulation are performed for different sample size, and various level of standard deviation to observe the performance of this method in estimate the parameters of 2-D sinusoidal signal model , This model was used for modeling  the Symmetric gray scale texture image and estimating by using

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 20 1930
Journal Name
College Of Islamic Sciences
The causes of defeat and weakness and humiliation as described by Al - Imran: Objective study
...Show More Authors

Praise be to Allah. Praise be to Him. We seek refuge in Him. We seek forgiveness from him. We seek forgiveness from him.
And the disadvantages of our actions, of his hands
e
It is important, if not all, to pay tribute to God
Muhammad Abdo and Rasoulou, there is no way to deprive the nation of the weakness of God alone and not to share it
 Which suffer from the Quran, and the loss of its borders, bad
The work did not work and did not improve
Do what they offer and delay the others, except by reference to this Koran and the extraction of treasures and secrets
 And news.
The Great Quran Study

Lu Imito ordered each poisoned, and achieved several targets of
YEMYA: Knowing the secrets of the Grea

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref