Preferred Language
Articles
/
jkmc-268
The Value of Diffusion Weighted MRI in the Detection and Localization of Prostate Cancer among a Sample of Iraqi Patients
...Show More Authors

Background: Prostatic adenocarcinoma is the most widely recognized malignancy in men and the second cause of cancer-related mortality encountered in male patients after lung cancer.

Aim of the study:  To assess the diagnostic value of diffusion weighted imaging (DWI) and its quantitative measurement, apparent diffusion coefficient (ADC), in the identification and localization of prostatic cancer compared with T2 weighted image sequence (T2WI).

Type of the study: a prospective analytic study

Patients and methods: forty-one male patients with suspected prostatic cancer were examined by pelvic MRI at the MRI department of the Oncology Teaching Hospital/Medical City in Baghdad from September 2017 to September 2018. Thin sections axial T2 and DWI sequences were performed for each patient. Two patients were excluded from the study due to poor image quality (motion artefact). Regions with hypointense signal on T2WI and/or restricted lesion in DWI were determined. The ADC values were measured and the results were registered and sent for biopsy correlation. The sensitivity, specifity, accuracy and other parameters were calculated for T2WI and DWI.

Results: The sensitivity and specifity of T2WI in the detection of prostate cancer was about 76.6% and 77% respectively. These improved to 96% and 88.8% by performing the DWI and measuring the ADC value. The mean ADC value was greatly lower in prostatic cancer (about 650x 10-6 mm2 /s) than in normal prostate parenchyma (about 1250 x10-6 mm2 /s) with significant difference between them (p value about 0.04)

Conclusion: In practice, using diffusion weighted MRI sequence and its ADC quantitative measurement greatly increases tumor detection in patients suspicious to have prostatic cancer and should be routinely used when doing pelvic MRI for patients with high clinical suspicion.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Level of Psychological Burnout among University Professors in Light of Armed Conflicts in Yemen: Center for Political and Strategic Studies - Sana'a University - Yemen
...Show More Authors

The research aims to identify the level of psychological burnout among the professors of Sana’a University in light of the armed conflicts in Yemen. The research sample consisted of (104) faculty members. A descriptive-analytical approach was adopted. The results of the research showed that university professors suffer from psychological burnout at a very high level in the overall score of the scale. There were no statistically significant differences in terms of gender, academic degree, teaching experience, marital status, number of family members, or salary. In light of the results, the researcher presented a number of relevant recommendations and suggestions.

View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Saudi Medical Journal
Striae distensae-like lesions. A cause of scarring alopecia among children.
...Show More Authors

KE Sharquie, MM Al-Waiz, AA Al-Nuaimy, Saudi medical journal, 2002 - Cited by 11

View Publication
Publication Date
Mon May 09 2022
Journal Name
Biochemical And Cellular Archieve
INFLUENCE OF HUMAN LEUKOCYTE ANTIGEN HLA-DRB1 ON SUSCEPTIBILITY TO GIARDIA LAMBLIA INFECTION OF IRAQI PATIENTS
...Show More Authors

Giardia lamblia is the worldwide most common intestinal protozoan parasite. It was indicated that Giardia is the most important agent that causes acute and chronic diarrhea in infants, young children and travelers. The aim was to detect the influence of host HLA alleles on the susceptibility to infection with G. lamblia in a sample of Iraqi patients. A total of (40) patients with giardiasis aged (14-39) years were registered. All of them were symptomatic and (40) healthy individuals matched age and sexes were included as controls. All patients were prepared to stool examination to detect G. lamblia and eliminated other pathogens, as well as human leukocyte antigen (HLA) class II alleles (DRB1) typing. The most common detected alleles in pat

... Show More
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the international auditing standard IAS 540 "Auditing accounting estimates and related disclosures" in limiting income smoothing practices in the financial statements (from the point of view of Iraqi auditors)
...Show More Authors

                The current research aims to show the impact of the international auditing standard IAS 540 in reducing income smoothing practices in Iraq. To achieve the objectives of the research, the researcher adopted a questionnaire for a sample of auditors in Iraq. Where 60 forms were distributed and after the questionnaire was retrieved and statistical analysis was done using the SPSS program, The research reached a number of results, the most important of which are: the existence of a statistically significant effect of the application of the international auditing standard IAS 540 in reducing income smoothing practices, The research recommended the necess

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 01 2014
Journal Name
World Journal Of Pharmaceutical Sciences
Detection of JAK2V617F Mutation and Serum Levels of Alkaline Phosphatase and Lactate Dehydrogenase in Chronic Myelogenous Leukemia.
...Show More Authors

Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a

... Show More
Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The role of the requirements of Total Quality Environmental Management in promoting environmental sustainability-An Empirical Study in the Iraqi Drilling Company
...Show More Authors

Abstract

quality issue is the only issue the interesting in recent years of the last century, but also came out of sync with the other issue is the issue of environment, Where they have become represent two sides of one currency, challenges faced by the world and raised by the environmental problems have made industrial organizations pay great attention to the environment by improving their environmental performance, and that's where the oil industry is one of the most dangerous industries, influential and damaging to the environment due to the organizations move away from oil for adoption The application of EMS then a tool to improve environmental performance has been chosen sam

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Serum Ferritin Levels for Iraqi Patients with Hashimoto's Thyroiditis
...Show More Authors

Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref