Preferred Language
Articles
/
jkmc-524
Evaluation of Etiological Causes of Hypothyroidism among Patients Visiting Specialized Center for Diabetes and Endocrinology

Background: Many structural or functional abnormalities can impair the production of thyroid hormones and cause hypothyroidism.Objectives: to identify the main etiological causes of hypothyroidism among patients visiting Specialized Center for Diabetes and Endocrinology.Methods: This study was conducted in the Specialized Center for Diabetes and Endocrinology on 217 patients with proved hypothyroidism, from 2006 to 2008. Every patient was tested with thyroid function tests, Ultrasound examination, thyroid autoantibodies, fine needle aspiration, radiology of skull, isotopes scan, also checking adrenal and gonadal function. Results: Out of these 217 patients 120 patients have thyroiditis 33 patients had been undergone thyroidectomy. 39 patients had received radioactive iodine, 19 patients had congenital causes. One patient had Pituitary cause, 5 patients had graves diseases.Conclusions: It was found that the common causes of hypothyroidism are either chronic autoimmune thyroiditis or destructive treatment for thyrotoxicosis. The results of this study suggest an increase in autoimmune thyroid disease similar to the rising prevalence of type1 DM possibly indicating a rising incidence of autoimmunity in young people

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Scopus (11)
Crossref (9)
Scopus Crossref
View Publication
Publication Date
Wed Jul 01 2015
Journal Name
The Sai 2015
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jun 06 2001
Journal Name
المجلة العراقية للعلوم الاحصائية
Suggest formulas for estimating carry-over effects in two-period changeover design

This research aims to suggest formulas to estimate carry-over effects with two-period change-over design, and then, all other effects in the analysis of variance of this design, and find the efficiency of the two-period change-over design relative to another design (say, completely randomized design).

Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Nov 19 2024
Journal Name
Technical University Of Munich
Conditions for Applying Public Private Partnership PPP in Iraq Infrastructure Projects Successfully

Public private partnership PPP is a method to procure public projects in order to achieve additional value for money in terms of efficiency and quality of services. This thesis studies the concepts of PPP, advantages and disadvantages of PPP. In addition, current Iraq infrastructure projects situations and needs, as well as, some aspects relating to the Iraq’s construction market, legal and contract systems were discussed. A financial model was carried out and applied to a real-life case study project. Finally, a survey targeted researchers; public and private- sectors were applied.

View Publication
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Inference for Generalized Inverted Exponential Distribution UnderProgressive Type-I Interval Censored Data

This article discusses the estimation methods for parameters of a generalized inverted exponential distribution with different estimation methods by using Progressive type-I interval censored data. In addition to conventional maximum likelihood estimation, the mid-point method, probability plot method and method of moments are suggested for parameter estimation. To get maximum likelihood estimates, we utilize the Newton-Raphson, expectation -maximization and stochastic expectation-maximization methods. Furthermore, the approximate confidence intervals for the parameters are obtained via the inverse of the observed information matrix. The Monte Carlo simulations are used to introduce numerical comparisons of the proposed estimators. In ad

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Strong Differential Sandwich Results for Analytic Functions Associated with Wanas Differential Operator

    In this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.

Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of King Saud University - Science
Crossref (12)
Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
5th Iet International Conference On Renewable Power Generation (rpg), 2016, London, Uk
Scopus (4)
Crossref (8)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain

     The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is

... Show More
Scopus Crossref
View Publication Preview PDF