Preferred Language
Articles
/
alkej-556
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the original signal for the sake of diagnosis.

      These calculations were carried out for different breast thicknesses to find out the best modulation laser beam wavelength and the optimum breast thickness necessary for diagnosis of benign and malignant tumors.

      According to our work the most suitable laser wave length to detect the breast tumor for pre- and postmenopausal females was 956 nm and 674 nm for both malignant and benign tumors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
The Effect of Toxoplasma Gondii on DNA SequenceAlteration among BreastCancer Patients
...Show More Authors

Objective: The study aims to determine the effect of Toxoplasma gondii infection on the
genetic sequence of breast cancer patients in the Medical City Hospital – Tumor Unit /
Iraq-Baghdad.
Methodology: A study was carried out in the City of Medicine / Oncology Unit / Baghdad,
during the period 1st June 2016 to 15
th March 2017. Forty samples of tissue and serum
were collected from patients who complaining from Breast cancer and infected with
Toxoplasmosis. Forty sera samples were taken from patients complaining from parasitic
infection only; without breast cancer as control group. Data is analyzed by using of
descriptive and inferential data analysis methods.
Results: The results show that there is an effe

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Asian Pacific Journal Of Cancer Prevention
Immunohistochemical study of the expressed cluster differentiation markers proteins type 20 and 56 in breast tissues from a group of Iraqi patients with breast cancers
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Spatial Distribution of Heavy Element in Erbil's Municipal Landfills by Using GIS
...Show More Authors

Untreated municipal solid waste (MSW) release onto land is prevalent in developing countries. To reduce the high levels of harmful components in polluted soils, a proper evaluation of heavy metal concentrations in Erbil's Kani Qrzhala dump between August 2021 and February 2022 is required. The purpose of this research was to examine the impact of improper solid waste disposal on soil properties within a landfill by assessing the risks of contamination for eight heavy elements in two separate layers of the soil by using geoaccumulation index (I-geo) and pollution load index (PLI) supported. The ArcGIS software was employed to map the spatial distribution of heavy element pollution and potential ecological risks. The I-geo values in summe

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Morphological and Anatomical Study of Tamarix aphylla (Tamaricaceae) in Iraq Central Region
...Show More Authors

The Tamarix aphylla is a wild perennial shrub with erect stems that are long and glabrous. They have leaves that are simple, alternate, sheathed, and the apex of the blade is acuminate. And a scaly clawed bract and the the inflorescences were simple, spike-like. The pistil consists of ovary pyramidal, 3 styles, and 3 stigmas. The androecium consists of five stamens that are antisepalous. The perianth was distinct with five sepals and five petals. The fruits were capsule-shaped, pyramidal, and smooth. The seed has an apical pappus of unicellular hygroscopic hairs; endosperm is absent. The anatomical study of the leaves contained a uniseriate epidermis consisting of one layer of elongated cells covered by a layer of papillary cuti

... Show More
View Publication
Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
Inspiration Of Typed Paintings From Folk Architecture In Asir Region: مريم محمد العمري
...Show More Authors

  This research aims to realize one of the pillars of Saudi vision (2030) through searching for new sources full of material folklore that had not previously been studied, so this study will study folk motifs engraved on the doors and windows in the Bani Amru Center in the Al-Namas governorate that is situated in the Asir region , in particular the tribe (Bani Rafe), before being disappeared due to the abandonment of the old architecture by the people of the region and their fascination with modern architecture, therefore I must as one of the people of the region document and preserve that through studying, analyzing, classifying it, then inspiring typed paintings using a new technical typing that have not yet been used in the Kingd

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Biodiversity of Rotifera and Cladocera in the upper region of Euphrates River- Iraq
...Show More Authors

Five representative sampling stations were selected in upper region of Euphrates river. Bimonthly sampling were collected from December 2000 to December 2001. Rotifera showed high density in December 2000 while high density of cladocera which recorded in October .The results of relative abundance index showed that rotifera: Polyarthera dolichoptera , Keratella cochlearis , K. valga, Cephalodella auriculata and cladocera: Bosmina longirostris , B.coregoni ,Chydorus spharicus, were more abundant in study stations. The results of constancy index showed 4 taxa belonged to rotifera and 2 taxa belonged to cladocera which were considered constant in the Euphrates river, where the other species varied between accessory and accidental speci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Science And Research (ijsr
Interaction of Alpha Particles with Breast Tissue
...Show More Authors

As modern radiotherapy technology advances, radiation dose and dose distribution have improved significantly. As part of a natural evolution, there has recently been renewed interest in therapy, particularly in the use of heavy charged particles, because these types of radiation serve theoretical advantages in all biological and physical aspects. The interactions of alpha particle with matter were studied and the stopping powers of alpha particle with Breast Tissue were calculated by using Beth-Bloch equation, Zeigler's formula and SRIM software, also the Range and Liner Energy Transfer (LET) and Breast Thickness As well as Dose and Dose equivalent for this particle were calculated by using Mat lab language for (0.01-200) MeV alpha ene

... Show More