Background: The study's objective was to estimate the effects of radiation on testosterone-related hormones and blood components in prostate cancer patients. N Materials and Method: This study aims to investigate the effects of radiation on 20 male prostate cancer patients at the Middle Euphrates Oncology Centre. Blood samples were collected before and after radiation treatment, with a total dose of 60- 70 Gy, The blood parameters were analyzed. The hospital laboratory conducted the blood analysis using an analyzer (Diagon D-cell5D) to test blood components before and after radiation. Hormonal examinations included testosterone levels, using the VIDASR 30 for Multiparametric immunoassay system Results: The study assessed the socio-demography of prostate cancer male patients, revealing that the majority were aged 69.55 t 10.76 years, with a weight of 75.3 t 10.84 Kg and height of 170.50 t 8.70 cm. The stage of cancer was assessed, with 25% of patients being IV and IIV, followed by II, IB, and V. Only one patient was at stage III. The Gleason Score (GS) was used to classify patients, with 40% being given a score of 7, followed by 6, 8, and 9 equally (20%). Total Prostate-specific Antigen (PSA) had a mean value of 12.87 t 2.78. Hematological analysis showed a significant decrease in random blood sugar levels, white blood cells, lymphocytes platelets, and hemoglobin levels after radiotherapy. Testosterone levels also declined after radiotherapy fractions. However, kidney functions like urea and creatinine levels increased after pelvic irradiation Conclusion: The study found that radiation treatment for prostate cancer significantly impacted blood components and hormones associated with testosterone. It led to reduced levels of random blood sugar, white blood cells, lymphocytes, platelets, haemoglobin, and testosterone. Additionally, high-energy therapeutic x-rays increased_ levels of urea and creatinine, indicating the need for strict monitoring and management of adverse effects.
Photodetector based on Rutile and Anatase TiO2 nanostructures/n-Si Heterojunction
The drones have become the focus of researchers’ attention because they enter into many details of life. The Tri-copter was chosen because it combines the advantages of the quadcopter in stability and manoeuvrability quickly. In this paper, the nonlinear Tri-copter model is entirely derived and applied three controllers; Proportional-Integral-Derivative (PID), Fractional Order PID (FOPID), and Nonlinear PID (NLPID). The tuning process for the controllers’ parameters had been tuned by using the Grey Wolf Optimization (GWO) algorithm. Then the results obtained had been compared. Where the improvement rate for the Tri-copter model of the nonlinear controller (NLPID) if compared with
Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreCrime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o
This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreSome of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreWe study in this paper the composition operator of induced by the function ?(z)=sz+t where , and We characterize the normal composition operator C? on Hardy space H2 and other related classes of operators. In addition to that we study the essential normality of C? and give some other partial results which are new to the best of our knowledge.