Preferred Language
Articles
/
jbcd-2379
The Effect of Oral Contraceptive Pill on Cortical Thickness and Bone Mineral Density of The Mandibular Mental and Gonial Regions in Premenopausal Females Using Spiral Computed Tomography
...Show More Authors

Background: Prolonged use of low-dose estrogen ''20 micrograms or less" Combined oral contraceptive pill (that have estrogen and progesterone steroid hormone) had an effect on bone turnover .Bone mineral density is used in clinical medicine as an indirect indicator of osteoporosis and fracture risk. The aim of the study: The aim of this study was to investigate the effect of low dose oral contraceptive pill on the cortical thickness (in millimeter) and bone mineral density at the mandibular cortex of mental and gonial regions in Hounsfield unit(HU) using spiral computed tomography. Material and method: This prospective study was conducted on computed tomographic image of 100 women aged between (20-40) years .The collected sample includes patients attended for different diagnostic purposes to AL-Shaheed Al-Seder Teaching General Hospital of Al-Najaf AL-Ashraf from Julay, 2015 to May 2016.Data were grouped into two categories :group (1)control group (don't use combined oral contraceptive pill) (n=50);group(2)women taking low dose(20microgram) combined oral contraceptive pill for more than 2 years,(n=50).Cortical thickness measured in millimeter and Bone Mineral Density measured in Hounsfield unit both in mental foramen and gonial angle regions .Physical activity number of parity type of lactation were documented by questionnaire. Result: There was a statically significant difference; in cortical thickness p=0.037 and bone mineral density P=0.007 in mental area between the two groups ;the lowest mean in group (2)and highest mean in group(1) . After adjustment for age ,number of parity, and physical activity measurement scores ,there was a significant difference p=0.001 in mean of bone mineral density and p=0.065 for cortical thickness of gonial angle between the two groups ;the highest mean in group (1) and lowest mean in group (2). CONCLUSION: Computed tomography is a good diagnostic method to measure the value of cortical thickness and bone mineral density simultaneously in mental and gonial region of the mandible in premenopausal female using low dose combined oral contraceptive pill which have small effect on bone ;depended on the woman's age and the duration of using the pill ;that did not appear until about two years of use.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Comparative Study of Pressure Losses and Hole Cleaning Efficiency of Water and Polymer solutions in Horizontal Wells
...Show More Authors

The main objective of this study is to experimentally investigate the effect of the CMC polymeric drag reducer on the pressure drop occurred along the annulus of the wellbore in drilling operation and investigate the optimum polymer concentration that give the minimum pressure drop. A flow loop was designed for this purpose consist from 14 m long with transparent test section and differential pressure transmitter that allows to sense and measure the pressure losses along the test section. The results from the experimental work show that increasing in polymer concentration help to reduce the pressure drop in annulus and the optimum polymer concentration with the maximum drag reducing is 0.8 kg/m3. Also increasing in flow rate a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 15 2014
Journal Name
World Journal Of Pharmaceutical Sciences
Prevalence of JAK2 V617F Mutation and Serum Levels of Alkaline Phosphatase and Lactate Dehydrogenase in Chronic Myelogenous Leukemia
...Show More Authors

Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation(called Ph chromosome) in hematopoietic stem cells (HSCs).JAK2V617F mutation is an acquired singlenucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancyother than CML. This study aimed to investigate the prevalence of JAK2V617F mutation and serum levels ofalkaline phophatase (ALP) and lactate dehydrogenase (LDH) in Ph+ CML Iraqi patients treated with imatinib.Blood samples were collected from 42 Ph+ CML patients who have been received at least six month therapywith imatinib. DNA was extracted, and real time polymerase chain reaction (qPCR) was used for JAK2V617Fdetection. Serum levels of A

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Carbohydrate Antigen CA19-9 Levels in Sera and Tissues' Homogenate of Breast and Thyroid Benign Cases
...Show More Authors

         The aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref