Chlamydia trachomatis is the most common of negative gram bacteria that cause sexually transmitted diseases. It affects the reproductive system in women, not the symptoms of the disease, but the most serious is the long-term effects of the reproductive system.. out of 100 women were attending different hospitals in Baghdad included the Gynaecology Departments of Women Health Center at Al-Elwyia Obstetrics Hospital . Ibn Al balady Maternity and Children's Hospital , Kamal al-Samarrai hospital Fertility Center infertility treatment and In Vitro Fertilization ( IVF ) (20 control and 80 women with infertility) DNA was extracted from the Endocervical Swabs of all infertili women, to investigate the bacteria by using Real time -PCR technique and another swab were subjected to direct Rapid Test . The venous blood sample was obtained, serum were diagnosis by Anti- Chlamydia trachomitis Chlamydia trachomitis IgG ELISA.
The result of the Real time-PCR revealed was significant associated with infertility women (OR= 0.733; 13.75%, P= 0.041), among 80 infertili women, while was no significant diagnosis by ELISA (OR= 0.063; 2.50%, p= 0.095). and no significant associated with Rapid Test .
In summary Real time-PCR has the possibility to contribute in the primary screening for infertility in women.
Abstract:
In this research we discussed the parameter estimation and variable selection in Tobit quantile regression model in present of multicollinearity problem. We used elastic net technique as an important technique for dealing with both multicollinearity and variable selection. Depending on the data we proposed Bayesian Tobit hierarchical model with four level prior distributions . We assumed both tuning parameter are random variable and estimated them with the other unknown parameter in the model .Simulation study was used for explain the efficiency of the proposed method and then we compared our approach with (Alhamzwi 2014 & standard QR) .The result illustrated that our approach
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreA computational investigation is carried out in the field of charged particle optics with the aid of the numerical analysis methods. The work is concerned with the design of symmetrical double pole piece magnetic lens. The axial magnetic flux density distribution is determined by using exponential model, from which the paraxial-ray equation is solved to obtain the trajectory of particles that satisfy the suggested exponential model. From the knowledge of the first and second derivatives of axial potential distribution, the optical properties such as the focal length and aberration coefficients (radial distortion coefficient and spiral distortion coefficient) are determined. Finally, the pole piece profiles capable of pr
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreWhile analytical solutions to Quadratic Assignment Problems (QAP) have indeed been since a long time, the expanding use of Evolutionary Algorithms (EAs) for similar issues gives a framework for dealing with QAP with an extraordinarily broad scope. The study's key contribution is that it normalizes all of the criteria into a single scale, regardless of their measurement systems or the requirements of minimum or maximum, relieving the researchers of the exhaustively quantifying the quality criteria. A tabu search algorithm for quadratic assignment problems (TSQAP) is proposed, which combines the limitations of tabu search with a discrete assignment problem. The effectiveness of the proposed technique has been compared to well-established a
... Show MoreStress urinary incontinence (SUI) is involuntary urine leakage during activities that increase abdominal pressure such as coughing, sneezing and lifting of heavy weights. This is a very common disorder among women with history of multiple vaginal deliveries with an obstructed labor. SUI is considered one of the most distressing problems, especially for younger women, with severe quality of life implications, it caused by the loss of urethral support, usually as a consequence of the supporting structural muscles in the pelvis.
Objective: To prove and demonstrate the effect of a fractional CO2 micro-ablative laser (10600nm) in intra vaginal therapy for treating SUI and achieve a clinical improvement of t
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
X-ray diffractometers deliver the best quality diffraction data while being easy to use and adaptable to various applications. When X-ray photons strike electrons in materials, the incident photons scatter in a direction different from the incident beam; if the scattered beams do not change in wavelength, this is known as elastic scattering, which causes amplitude and intensity diffraction, leading to constructive interference. When the incident beam gives some of its energy to the electrons, the scattered beam's wavelength differs from the incident beam's wavelength, causing inelastic scattering, which leads to destructive interference and zero-intensity diffraction. In this study, The modified size-strain plot method was used to examin
... Show MoreBioethanol is an attractive fuel with higher potential for energy security and environmental safety. Olive solid residues were used as a raw material for the production of bioethanol through the use of different preliminary treatments . Separate treatments with cellulose, hydrochloric acid (HCl 5%), sulfuric acid (H2SO4 2%), and liquid ammonia NH4OH (20%) were used to convert cellulose and hemicellulose into monosaccharaides. The production of ethanol was observed during the fermentation process using R. minuta under anaerobic conditions. After 3 days of fermentation, lowest concentrations of ethanol of 0.233, 0.249, 0.261, and 0.275 g/ l were produced from ol
... Show MoreThe OSPF cost is proportionally indicated the transmitting packet overhead through a certain interface and inversely proportional to the interface bandwidth. Thus, this cost may minimized by direct packet transmitting to the other side via various probable paths simultaneously. Logically, the minimum weight path is the optimum path. This paper propose a novel Fuzzy Artificial Neural Network to create Smart Routing Protocol Algorithm. Consequently, the Fuzzy Artificial Neural Network Overlap has been reduced from (0.883 ms) to (0.602 ms) at fuzzy membership 1.5 to 4.5 respectively. This indicated the transmission time is two-fold faster than the standard overlapping time (1.3 ms).