Background : Hyperglycosylated hCG a newly discovered variant of hCG which can be used as a predictor of invasion of trophoblastic cells in patient with gestational trophoblastic disease. Objectives : To measure hyperglycosylated human chorionic gonadotrophin and to assess how far it can be used as predictor of invasion in invasive mole and choriocarcinoma. Study design control study. Setting: : Case Gynecological department in Baghdad Teaching Hospital from January 2016 to January 2017. Patient and Methods : 60 women were enrolled in this study 30 of them were with gestational trophoblastic disease (no.= 30 ) the remainder were normal pregnancy (no. =30) , hCG –H level was measured in both groups. Results : Mean serum hCG-H level was significantly higher in patients with gestational trophoblastic disease compared to control women (460.5 ± 168.35 , 206.8± 19.99 ) respectively with p value < 0.05. Mean serum hCG-H level was significantly higher in patients with gestational trophoblastic disease Invasive mole and chriocarcinoma compared to patient with molar pregnancy. Before evacuation (772.11 ± 184.08, 398.27 ±65.86). After evacuation (550.52 ± 146.15 , 340.40 ±85.61). With p value < 0.05. Conclusion : 1) Serum hCG-H level was higher in patients who had invasive mole and patients with choriocarcinoma than patients with gestational trophoblastic disease , so it can be used as a predictor of invasion in patients with invasive mole and choriocarcinoma. 2) Serum hCG-H level can be used in patient with abnormal β- hCG after evacuation when it is slowly decreasing or plateau. 3) It is better to measure the ratio hCG-H/total hCG and using uniform method test and units so we can understand the actual changes that happen in invasion.
The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MorePurpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreBackground. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.