Preferred Language
Articles
/
jkmc-160
Endomeriosis of Cesarean Section Why on Leet side?
...Show More Authors

Background: Endometriosis is defined as the presence or growth of ectopic endometrial tissue outside their usual site ( the uterus). It is a common condition in women. It may occur in the ovaries, fallopian tubes, vagina and rarely, endometriosis may occur in the abdomen and lungs. Endometriosis is common among women of reproductive age. It is either primary or secondary. The triad of diagnosis is a pain with menstruation, cesarean scar and a mass in the scar.                                                                                                                             Methods: A report a series of 65  patients in the period from 1st Jan 2013 to 31st  Dec 2017. The study was performed in Al-Kindi Teaching Hospital and a private hospital. The mean age was 35 years (range 20-45).All patients were treated surgically i.e. excision of the tumor and old surgical scar in the lower abdomen.

Result: mean age was 35 years (range 20-45). Thirty  patients (46.15%) were housewives  while 35(53.84%) were officers. The interesting finding is that 52 patients had the mass in the left side, 10 in the middle and only 3 in the right side of the scar respectively.

Conclusion: Our study demonstrated a lateral asymmetry in the location of scar endometriosis i.e. mostly on the left side. The prevalence on left side of scar can be added to the triad of diagnosis mentioned above I.e. cyclical pain, cesarean scar and mass mostly in left side of the scar.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Electrical And Electronics Engineering
HF Wave Propagation Prediction Based On Passive Oblique Ionosonde
...Show More Authors

High frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the

... Show More
View Publication Preview PDF
Scopus
Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Human Resources Accounting And its Reflection on Quality Cost
...Show More Authors

The development of human resources training programs can assist in agreat deal in creating products of high quality with quantitive advantage for the economicunit;through the sale of products by prices higher of the peer products price in the arket,or decreasing production costs which lead into increusing the unet  profits. for these reasons, the human resources have got great importance for their great role in  any economy,and they havestarled to consentrate on accounting these resource.From this point of view, this research has handied human resources accounting and their effect on quality costs.  In(MID-Refinery Company),quality costs are determined ,then we have larified the reality of training and development in the o

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus (1)
Scopus
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS
...Show More Authors

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Thu Feb 02 2012
Journal Name
Education College Journal/al-mustansiriyah University
On Significance Testimator in Pareto Distribution Via Shrinkage Technique
...Show More Authors

In this paper, preliminary test Shrinkage estimator have been considered for estimating the shape parameter α of pareto distribution when the scale parameter equal to the smallest loss and when a prior estimate α0 of α is available as initial value from the past experiences or from quaintance cases. The proposed estimator is shown to have a smaller mean squared error in a region around α0 when comparison with usual and existing estimators.

Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Recent Trends In Engineering & Research
Password Authentication Based On Modify Bidirectional Associative Memory (MBAM)
...Show More Authors

Password authentication is popular approach to the system security and it is also very important system security procedure to gain access to resources of the user. This paper description password authentication method by using Modify Bidirectional Associative Memory (MBAM) algorithm for both graphical and textual password for more efficient in speed and accuracy. Among 100 test the accuracy result is 100% for graphical and textual password to authenticate a user.

Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalized Γ-n-Derivations on Prime Γ-Near-Rings
...Show More Authors
Abstract<p>The main purpose of this paper is to define generalized Γ-n-derivation, study and investigate some results of generalized Γ-n-derivation on prime Γ-near-ring G and <italic>K</italic> be a nonzero semi-group ideal of <italic>G</italic> which force G to be a commutative ring.</p>
View Publication
Scopus (1)
Scopus Crossref