Background: Dialysis is in common use to treat patients
with end stage renal failure .However longstanding dialysis
harboring some cellular changes in various body fluids.
This study was conducted in order to detect these changes
in urine.
Objective: The study was conducted to detect cellular
changes in urine of patients with longstanding dialysis.
Method: Fifty-three urine samples were examined
cytologically obtained from patients with longstanding
dialysis during 6 months period. Freshly voided midstream
urine samples were taken . Samples were centrifuged and 2
to 3 drops of sediments were smeared on 2 glass slides and
fixed in 95% ethyl alcohol then stained with Hand E stain
to be evaluated.
Results: Gross physical examination of all urine samples
were neither purulent nor hemorrhagic .Microscopically
there was increased exfoliation of urothelial cells except in
9 cases. No significant cytological atypia were seen in all
urine samples. Excessive exfoliation in the absence of
significant inflammation, hemorrhage and cytological
atypia compared with control group.
Conclusion: The study revealed that some cytological
changes do occur in the urothelial cells of patients with
longstanding dialysis. These changes need further attention
and study to disclose their causes.
The research problem is that the traditional methods of internal auditing are somewhat heavy with long and rigid procedures for the members of the audit process team, especially in light of the current developments that are reflected in the business environment and internal audit reports, so it is necessary to reconsider the traditional internal audit work method and assess the extent of its development by agile methods to reduce the time of the audit process on the activities and elements that add value and direct the effort and time to the activities and elements that add value to the work of the economic unit and the report of the internal auditor.
The research aims to study the possibility of applying agile internal auditing
... Show MoreMeloxicam (MLX) is non-steroidal anti -inflammatory, poorly water soluble, highly permeable drug and the rate of its oral absorption is often controlled by the dissolution rate in the gastrointestinal tract. Solid dispersion (SD) is an effective technique for enhancing the solubility and dissolution rate of such drug.
The present study aims to enhance the solubility and the dissolution rate of MLX by SD technique by solvent evaporation method using sodium alginate (SA), hyaluronic acid (HA), collagen and xyloglucan (XG) as gastro-protective hydrophilic natural polymers.
Twelve formulas were prepared in different drug: polymer ratios and evaluated for their, percentage yield, drug content, water so
... Show MoreAbstract. Fibrewise micro-topological spaces be a useful tool in various branches of mathematics. These mathematical objects are constructed by assigning a micro-topology to each fibre from a fibre bundle. The fibrewise micro-topological space is then formed by taking the direct limit of these individual micro-topological spaces. It can be adapted to analyze various mathematical structures, from algebraic geometry to differential equations. In this study, we delve into the generalizations of fibrewise micro-topological spaces and explore the applications of these abstract structures in different branches of mathematics. This study aims to define the fibrewise micro topological space through the generalizations that we use in this paper, whi
... Show MoreThe sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreIn this research, that been focused on the most important economic benefits expected when applying the three standards of sustainability in construction projects (economic, environmental and social). Fuzzy AHP, a multi-decision decision-making technique for evaluating construction projects. Which when used we get the speed and accuracy in the results. Using this technique will reduce uncertainties decisions significantly (fuzzy environment), that found in most projects .The results of the data analysis showed that the economic standards take the greatest relative importance (60%) among the three sustainability standards. Therefore, the implementation of any standards need a cost so the economic benefit of any proje
... Show MoreThis research was aimed to evaluate activity of Rosemary volatile oil and Nisin A in vivo and on B. cereus isolated from some canned meat products in vitro. The results showed that the activity of Rosemary volatile oil (2000 µg/ml) and Nisin A (350 µg\ml) attained to 27 and 19 mm inhibitory zone diameter respectively in well diffusion method. The viable plate count from samples of canned meat treated with effective concentration of Rosemary volatile oil and Nisin A were examined. The samples with Rosemary volatile oil was not showed any CFU/g after 9 days of preservation while sample with Nisin A and control observed 49 and 45 CFU/g respectively. In vivo experiment on mice, two weeks after oral dose of Rosemary volatile oil (2000
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More