BACKGROUND: Preterm labour is a major cause of perinatal morbidity and mortality, so it is important to predict preterm delivery using the clinical examination of the cervix and uterine contraction frequency. New markers for the prediction of preterm birth have been developed such as transvaginal ultrasound measurement of cervical length as this method is widely available. OBJECTIVE: To determine, whether transvaginal cervical length measurement predicts imminent preterm delivery better than digital cervical length measurement in women presented with preterm labour and intact membranes. PATIENTS AND METHODS: Two hundred women presented with preterm labour between 24 and 36+6 weeks of gestation were included in this study. All women subjected for digital and transvaginal ultrasound cervical length measurement and the outcome measures were occurrence of preterm delivery within 48 hours and within 7 days. RESULTS: Assessment of cervical length measurement using transvaginal ultrasound for the 200 women presented with preterm labour with intact membrane revealed that 8 (4%) delivered within 48 hours and 16 (8%) delivered within 7 days. According to the Bishop score, the test was positive if the Bishop score was ≥8, or 4-7 with cervical length ≤30 mm. The cut-off value for transvaginal ultrasound cervical length considered as 30 mm in the study group. CONCLUSION: Transvaginal sonographic measurement of cervical length can predict imminent preterm delivery in women presented with preterm uterine contractions and Bishop score between 4 - 7 compared with digital cervical length measurement.
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression
In recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen
... Show MoreThe primary issue addressed in this research revolves around identifying the interactive elements provided by the Twitter platform and understanding their utilization by digital newspapers with official accounts. These newspapers broadcast content in line with their policies. This study is classified within descriptive research that employed a survey method and content analysis tool. The methodology relies on the "how was it said?" approach to categorize the analysis. The research yielded the following results:
Twitter utilized numerous interactive elements for disseminating tweets, which include "text, branching links, hashtags, digital images, digital videos, digital audio, and digital polls." However, thes
Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
The cervical cancer considered as the fourth female prevalent disease worldwide, it was once the most extensively recognized female cancer two in many low-income countries. Human Cytomegalovirus (HCMV) exhibits broader tropism and can cause infection in most of the human body organs. Although, human cytomegalovirus HCMV is not yet considered an oncogenic virus, there is increased evidences of HCMV infection implication in malignant diseases of different cancer types. The present study aims to evaluate the effect of CMV infection on the development of HPV16 positive cervical cancinoma. The current retrospective study enrolled a number of paraffinized cervical cancer tissues .included 30 cervical carcinomatous tissues and 10 biopsies from an
... Show MoreThe study aimed to monitor the concept of reputation in the previous literature, its relationship to mental image and identity, and to reveal recent trends in its measurement Techniques.
The study relied on a descriptive approach using library survey and comparative analysis, and the study reached following conclusions:
Despite the beginning of the first signs of reputation In the fifties of the last century, however, Defining and standardizing the concept with clear and specific dimensions began in the 1990s and the beginning of the third millennium. The concept of reputation refers to the stakeholders’ overall evaluation of organizations, which reflects their perceptions of
... Show MoreThe present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreThis research aims to Presented model can be applicable – in the frame of current accounting implementations - to measure environmental effects and disclosure then in the financial statements of economic entities after determined the environmental performance scopes of environmental activities that is works by this entities , because of importance of accounting information which presentation by accounting systems which's effectiveness tool on hand of decision maker about site plans and goals and drawing policies aims protection environment sustainable the represented of naturalism wealth elements . The researcher could be able to application his suggested model which's proof the ability to environmental accounting measurement and discl
... Show MoreAs a well-known oral and intravenous antifungal, voriconazole (VRN) has an extensive history of usage in the medical field. Solid lipid nanoparticles (SLNs) have been produced to treat ocular fungal keratitis in the eye. A 32Box-behnken design was used to produce a variety of new formulas for hot-melt extrusion. The SLNs were evaluated by entrapment efficiency (EE percent), particle size (PS), polydispersity index (PDI), and zeta potential (ZP). A series of in-vitro and in-vivo studies were carried out on the new formula. The produced vesicles’ EE, PS, PDI, and ZP values were all good. SLNs eye drops were numerically adjusted to include carbopol, a stabilizer, lipids, and a surfactant, among other substances. ZP of -36.5 ± 0.20 m
... Show More