Background: Prostatic adenocarcinoma is the most widely recognized malignancy in men and the second cause of cancer-related mortality encountered in male patients after lung cancer.
Aim of the study: To assess the diagnostic value of diffusion weighted imaging (DWI) and its quantitative measurement, apparent diffusion coefficient (ADC), in the identification and localization of prostatic cancer compared with T2 weighted image sequence (T2WI).
Type of the study: a prospective analytic study
Patients and methods: forty-one male patients with suspected prostatic cancer were examined by pelvic MRI at the MRI department of the Oncology Teaching Hospital/Medical City in Baghdad
... Show MoreIn this work, the effect of annealing temperature on the electrical properties are studied of p-Se/ n-Si solar cell, which p-Se are deposit by DC planar magnetron sputtering technique on crystal silicon. The chamber was pumped down to 2×10−5 mbar before admitting the gas in. The gas was Ar. The sputtering pressure varied within the range of 4x10-1 - 8x10-2mbar by adjusting the pumping speed through the opening control of throttle valve. The electrical properties are included the C-V and I-V measurements. From C-V measurements, the Vbi are calculated while from I-V measurements, the efficiency of solar cell is calculated.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreKlebsiella pneumoniae is a severe opportunistic strain of enteric bacteria that is a major cause of urinary tract infection and pneumonia. This study was conducted in Baghdad City during September 2020-November 2020 on 50 clinical samples of urine, vaginal, sputum, wound swabs, ear swabs, and burn swabs. strains were identified using the VITEK-2 compact system and tested in K. pneumoniae terms of susceptibility to various antimicrobial drugs by Kirby-Bauer test. The isolates were more predominant in the females (56%) compared to males (44%). The antibiotic resistance rate of varied among different isolated clinical sample sources. K. pneumoniae K. pneumoniae isolated from different clinical specimens differed with respect
... Show MoreThis work evaluates the economic feasibility of various production scenarios for the Zubair reservoir in the Kifl oil field using cash flow and net present value (NPV) calculations. The Kifl field is an exploratory field that has not yet been developed or assessed economically. The first well was drilled in 1960, and three other wells were later drilled to assess the oil accumulation, so in this research, Different production scenarios were evaluated economically. These scenarios were proposed based on the reservoir model of the Zubair formation in the field. The research methodology used QUE$TOR software to estimate capital expenditures (CapEx) and operating expenditures (OpEx) based on field-level data, production prof
... Show MoreThe antiviral activity of leaf extracts from Datura stramonium and tomato plants inoculated with TMV, combined with 20% skimmed milk, was investigated. A TMV isolate was confirmed using bioassay, serological, and molecular approaches and subsequently used to inoculate plants. Tomato plants, both pre- and post-inoculated with TMV, were sprayed with leaf extracts from either TMV-free or infected plants, alone or mixed with 20% skimmed milk. Enzyme-linked immunosorbent assay (ELISA) using tobamovirus-specific antibodies and local lesion tests were conducted to assess antiviral activity based on virus concentration and infectivity in treated plants. The experiment followed a completely randomized design (CRD), and the Least Significant
... Show Moreobjectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio
INTRODUCTION: A range of tools and technologies are at disposal for the purpose of defect detection. These include but are not limited to sensors, Statistical Process Control (SPC) software, Artificial Intelligence (AI) and machine learning (ML) algorithms, X-ray systems, ultrasound systems, and eddy current systems. OBJECTIVES: The determination of the suitable instrument or combination of instruments is contingent upon the precise production procedure and the category of flaw being identified. In certain cases, defects may necessitate real-time monitoring and analysis through the use of sensors and SPC software, whereas more comprehensive analysis may be required for other defects through the utilization of X-ray or ultrasound sy
... Show More