Background: Prolonged use of low-dose estrogen ''20 micrograms or less" Combined oral contraceptive pill (that have estrogen and progesterone steroid hormone) had an effect on bone turnover .Bone mineral density is used in clinical medicine as an indirect indicator of osteoporosis and fracture risk. The aim of the study: The aim of this study was to investigate the effect of low dose oral contraceptive pill on the cortical thickness (in millimeter) and bone mineral density at the mandibular cortex of mental and gonial regions in Hounsfield unit(HU) using spiral computed tomography. Material and method: This prospective study was conducted on computed tomographic image of 100 women aged between (20-40) years .The collected sample includes patients attended for different diagnostic purposes to AL-Shaheed Al-Seder Teaching General Hospital of Al-Najaf AL-Ashraf from Julay, 2015 to May 2016.Data were grouped into two categories :group (1)control group (don't use combined oral contraceptive pill) (n=50);group(2)women taking low dose(20microgram) combined oral contraceptive pill for more than 2 years,(n=50).Cortical thickness measured in millimeter and Bone Mineral Density measured in Hounsfield unit both in mental foramen and gonial angle regions .Physical activity number of parity type of lactation were documented by questionnaire. Result: There was a statically significant difference; in cortical thickness p=0.037 and bone mineral density P=0.007 in mental area between the two groups ;the lowest mean in group (2)and highest mean in group(1) . After adjustment for age ,number of parity, and physical activity measurement scores ,there was a significant difference p=0.001 in mean of bone mineral density and p=0.065 for cortical thickness of gonial angle between the two groups ;the highest mean in group (1) and lowest mean in group (2). CONCLUSION: Computed tomography is a good diagnostic method to measure the value of cortical thickness and bone mineral density simultaneously in mental and gonial region of the mandible in premenopausal female using low dose combined oral contraceptive pill which have small effect on bone ;depended on the woman's age and the duration of using the pill ;that did not appear until about two years of use.
This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThis paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreWind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show More