Background: Dialysis is in common use to treat patients
with end stage renal failure .However longstanding dialysis
harboring some cellular changes in various body fluids.
This study was conducted in order to detect these changes
in urine.
Objective: The study was conducted to detect cellular
changes in urine of patients with longstanding dialysis.
Method: Fifty-three urine samples were examined
cytologically obtained from patients with longstanding
dialysis during 6 months period. Freshly voided midstream
urine samples were taken . Samples were centrifuged and 2
to 3 drops of sediments were smeared on 2 glass slides and
fixed in 95% ethyl alcohol then stained with Hand E stain
to be evaluated.
Results: Gross physical examination of all urine samples
were neither purulent nor hemorrhagic .Microscopically
there was increased exfoliation of urothelial cells except in
9 cases. No significant cytological atypia were seen in all
urine samples. Excessive exfoliation in the absence of
significant inflammation, hemorrhage and cytological
atypia compared with control group.
Conclusion: The study revealed that some cytological
changes do occur in the urothelial cells of patients with
longstanding dialysis. These changes need further attention
and study to disclose their causes.
The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.
Negotiations are distinguished in that they are an easy and simple means between the conflicting parties, and it is an effective means at the same time as the conflicting parties seek understanding on the most effective way to solve their dispute, but negotiations are not always appropriate to resolve international disputes, especially when there is a disparity in power between the negotiating countries, or when it is missing Goodwill, or even when one of the parties is absent or less flexible, and the internal circumstances of one of the conflicting countries may play a negative or positive role in the success of the negotiations, away from the influence of the role of external variables in that, a
... Show MoreThe research dealt with a comparative study between some semi-parametric estimation methods to the Partial linear Single Index Model using simulation. There are two approaches to model estimation two-stage procedure and MADE to estimate this model. Simulations were used to study the finite sample performance of estimating methods based on different Single Index models, error variances, and different sample sizes , and the mean average squared errors were used as a comparison criterion between the methods were used. The results showed a preference for the two-stage procedure depending on all the cases that were used
This research is intended to high light the uses of political content in foreign Arabic / speaking websites, such as “ CNN “ and” Euro News“, The research problem stems from the main question: What is the nature of the use of the websites in the political content provided through them? A set of sub-questions that give the research aspects and aims to achieve a set of objectives , including the identification of topics that included , the political content provided through , the sample sites during the time period for analysis and determine that the study uses descriptive research based on the discovery of the researcher, describing it accurately and defining the relations between the components.
The research conducted the des
This research shed light on the relationship between the social orientation of the marketing (interests of the Organization ,the welfare of society, satisfaction the customer) strategies competitive dimensions of (cost leadership strategy, differentiation strategy, focus and strategy), As well as to to seek to achieve a number of knowledge and applied goals, and represented the field research problem extent of interesting researched the application of social orientation and interest in achieving competitive strategy and omission of this interest in the hotels the surveyed Organization, Based on this problem, and to clarify the relationshi
... Show MoreThe need for a flexible and cost effective biometric security system is the inspired of this paper. Face recognition is a good contactless biometric and it is suitable and applicable for Wireless Sensor Network (WSN). Image processing and image communication is a challenges task in WSN due to the heavy processing and communication that reduce the life time of the network. This paper proposed a face recognition algorithm on WSN depending on the principles of the unique algorithm that hold the capacity of the network to the sink node and compress the communication data to 89.5%. An efficient hybrid method is introduced based upon the advantage of Zak transform to offprint the farthest different features of the face and Eigen face method to
... Show MoreThis research aims to study the economic, social, and political reality of Iraqi women by identifying the obstacles and diagnosing their empowerment trends in various fields, assessing the extent of their participation in economic activity, and re-achieving balance between women and men by reducing the gender gap between them and reducing the percentage of female unemployment to the lowest possible level. Is achieved by enhancing confidence in Iraqi women by enacting laws and making decisions that allow them to access resources freely. The researcher used the descriptive and analytical method to deal with information and data related to the research topic over a specific period (1990-2018), using local, Arab, and international re
... Show MoreBackground: The rhizome of ginger is used in cooking and for medicinal purposes such as anti-bacterial, anti-fungal, anti-inflammatory and antioxidant. The aims of the study were to test the effect of ethanolic extract of ginger on growth, adherence and acidogenicity of mutans streptococci in comparison to chlorhexidine gluconate 0.2% and de-ionized water. Materials and methods: From saliva often volunteers (dental students 20-22 years); mutans streptococci was isolated, purified and diagnosed according to morphological characteristic and biochemical tests. Ginger was powdered and extracted, different concentrations of ginger extract were prepared. Chlorhexidine gluconate 0.2% used as a control positive; while de-ionized water was used as a
... Show MoreIn this work, watershed transform method was implemented to detect and extract tumors and abnormalities in MRI brain skull stripped images. An adaptive technique has been proposed to improve the performance of this method.Watershed transform algorithm based on clustering techniques: K-Means and FCM were implemented to reduce the oversegmentation problem. The K-Means and FCM clustered images were utilized as input images to the watershed algorithm as well as of the original image. The relative surface area of the extracted tumor region was calculated for each application. The results showed that watershed trnsform algorithm succeedeed to detect and extract the brain tumor regions very well according to the consult of a specialist doctor a
... Show MoreIn any security system, we need a high level of security, to maintain the secrecy of important data. Steganography is one of the security systems that are hiding secret information within a certain cover (video, image, sound, text), so that the adversary does not suspect the existence of such confidential information. In our proposed work will hide secret messages (Arabic or English) text in the Arabic cover text, we employed the RNA as a tool for encoding the secret information and used non-printed characters to hide these codes. Each character (English or Arabic) is represented by using only six bits based on secret tables this operation has provided a good compression since each Arabic character needs 16 bits and each English characte
... Show More