Preferred Language
Articles
/
alkej-556
Breast Tumor Diagnosis Using Diode Laser in Near Infrared Region
...Show More Authors

In the last years, new non-invasively laser methods were used to detect breast tumors for pre- and postmenopausal females. The methods based on using laser radiation are safer than the other daily used methods for breast tumor detection like X-ray mammography, CT-scanner, and nuclear medicine.  

      One of these new methods is called FDPM (Frequency Domain Photon Migration). It is based on the modulation of laser beam by variable frequency sinusoidal waves. The modulated laser radiations illuminate the breast tissue and received from opposite side.

      In this paper the amplitude and the phase shift of the received signal were calculated according to the original signal for the sake of diagnosis.

      These calculations were carried out for different breast thicknesses to find out the best modulation laser beam wavelength and the optimum breast thickness necessary for diagnosis of benign and malignant tumors.

      According to our work the most suitable laser wave length to detect the breast tumor for pre- and postmenopausal females was 956 nm and 674 nm for both malignant and benign tumors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 21 2020
Journal Name
Baghdad Science Journal
Spectrophotometer Determination of Cefixime in pure form and pharmaceutical preparation by Using Cloud point Extraction
...Show More Authors

Two simple methods spectrophotometric were suggested for the determination of Cefixime (CFX) in pure form and pharmaceutical preparation. The first method is based without cloud point (CPE) on diazotization of the Cefixime drug by sodium nitrite at 5Cº followed by coupling with ortho nitro phenol in basic medium to form orange colour. The product was stabilized and measured 400 nm. Beer’s law was obeyed in the concentration range of (10-160) μg∙mL-1 Sandell’s sensitivity was 0.0888μg∙cm-1, the detection limit was 0.07896μg∙mL-1, and the limit of Quantitation was 0.085389μg∙mL-1.The second method was cloud point extraction (CPE) with using  Trtion X-114 as surfactant. Beer

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Identification of Acinetobacter baumannii and Determination of MDR and XDR Strains
...Show More Authors

The current study focuses on the bacterium Acinetobacter baumannii due to its importance as a nosocomial infections source in addition to its increased resistance against antibiotics. Different clinical and hospital environment samples were collected, and cultured on A. baumannii selective media: Leed Acinetobacter agar and Herellea agar. A. baumannii have been identified by traditional methods, followed by confirmation using molecular identification to detect blaoxa-51 like gene which is considered a diagnostic gene since it is present in genome of all A. baumannii strains. The result was, nineteen bacterial isolates of A.baumannii were obtained, from twenty-seven suspected isolate

... Show More
View Publication Preview PDF
Scopus (11)
Scopus Clarivate Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
An Investigation Study of Thinning Distribution in Single Point Incremental Forming Using FEM Analysis
...Show More Authors

Single Point Incremental Forming (SPIF) is a forming technique of sheet material based on layered manufacturing principles. The sheet part is locally deformed through horizontal slices. The moving locus of forming tool (called as toolpath) in these slices constructed to the finished part was performed by the CNC technology. The toolpath was created directly from CAD model of final product. The forming tool is a Ball-end forming tool, which was moved along the toolpath while the edges of sheet material were clamped rigidly on fixture.

This paper presented an investigation study of thinning distribution of a conical shapes carried out by incremental forming and the validation of finite element method to evaluate the limits of the p

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Identification of Cladosporium sp. Fungi by in- silico RFLP-PCR
...Show More Authors

Cladosporium sp. plays an important role in human health, it is one of the pathogenic fungi which cause allergy and asthma and most frequently isolated from airborne spores.  In this study, a couple of universal PCR primers were designed to identify the pathogenic fungi Cladosporium sp. according to conserved region 5.8S, 18S and 28S subunit ribosomal RNA gene in Cladosporium species. In silico RFLP-PCR were used to identify twenty-four Cladosporium strains. The results showed that the universal primer has the specificity to amplify the conserved region in 24 species as a band in virtual agarose gel. They also showed that the RFLP method is able to identify three Cladosporium spe

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The In Situ Expression of IL-6 and IL-1? in breast cancer patients
...Show More Authors

Breast cancer is the second most common cancer in women world. Multiple Cytokines appear to have a dominant role in human breast cancer formation. Estimation of the in situ expression of  IL-6 and IL-1β in breast cancer patients. A sixty patients with breast cancer BC were divided into two clinical subgroups, (30) with malignant breast cancer MBC and (30) with benign breast tumor as a control group according to histological examination. In situ hybridization technique used for detection of IL-6 and IL-1β mRNA sequence in two groups.  The results showed that percentages of mRNA expression of IL-6 and IL-1β were in (≥ 11-50%) for malignant breast cancer. This research also investigated that (73.3%) of beni

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Determination Oxidant - Antioxidant Enzyme and some Trace Elements in Breast Cancer in Baghdad City
...Show More Authors

level of effectiveness of Glutathione - S - Transferees (GST), Glutathione peroxides (GPX),Malondialdehyde (MDA) the product of lipid peroxidation and some trace elements ( zinc,seleinum,iron ,copper ) had been measured in sera of (50) women with breast disease.which had been divided to : Control group (25),The first group (A) benign breast tumors (25),the second group (B) breast cancer (25). The results showed a clear moral high level of Glutathione - S - Transferees (GST), Glutathione peroxidase (GPX) , and Malondialdehyde (MDA) level in breast cancer group while a slight increase were observed in the levels of these enzymes and(MDA) in benign breast group. A significant reduction was evident in the levels of selenium and zinc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Ecti Transactions On Computer And Information Technology
Diagnosis of COVID-19 Infection via Association Rules of Cough Encoding
...Show More Authors

Article information: COVID-19 has roused the scientic community, prompting calls for immediate solutions to avoid the infection or at least reduce the virus's spread. Despite the availability of several licensed vaccinations to boost human immunity against the disease, various mutated strains of the virus continue to emerge, posing a danger to the vaccine's ecacy against new mutations. As a result, the importance of the early detection of COVID-19 infection becomes evident. Cough is a prevalent symptom in all COVID-19 mutations. Unfortunately, coughing can be a symptom of various of diseases, including pneumonia and inuenza. Thus, identifying the coughing behavior might help clinicians diagnose the COVID-19 infection earlier and distinguish

... Show More
Preview PDF
Scopus
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref