Background: Oral lichen planus is one of the most common dermatological diseases presenting in the oral cavity. Hence, viral infection of the oral mucosa may be involved in the pathogenesis of oral lichen planus, Taking in to consideration the oncogenic potential of HSV-1, this study aimed to assess the presence of Herpes Simplex Virus type one by direct immunoflourescent in oral lichen planus. This study aimed to assess the presence of HSV type1 by direct immunofluorescent in histopathologically diagnosed OLP Material and Method: Twenty formalin fixed embedded tissue blocks of oral lichen planus with 2 Positive control cases were taken from patients having infection with herpes labialis, US Biological herpes simplex virus-1 Glycoprotein
... Show MoreBackground : Diabetes mellitus, also known as blood sugar, is a series of metabolic disorders described by high blood glucose levels (hyperglycemia), low blood glucose (hypoglycemia), or both, resulting from defects in insulin production, insulin action, or both. Numerous studies have shown that interleukin (IL-6) acts on skeletal muscle cells , liver cells, and pancreas cells to influence glucose balance and metabolism, which directly or indirectly contributes to the development of diabetes. Research in this area is crucial because diabetes is recognized as a major risk factor for many diseases like Diabetic retinopathy, Diabetic nephropathy, Diabetic Neuropathy , heart disease and others. Patients and methods : In this study, we
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe research deals with the important and modern two subject (career path and the type of training program), and tries to find identify the extent of the impact of the requirements of a career path in determining the type of training program in the Ministry of Oil.
In order to achieve the aim of the research was the formulation of the following hypothesis: the impact of the requirements of the career path a meaningful moral influence in determining the type of training program.
The survey was adopted in the search, and sample consisted of (75) people were a factor in the Oil Ministry of People's managers and officials and staff, and used the questionnaire as an es
... Show MoreDiabetes mellitus type 2 (T2DM) is a chronic and progressive condition, which affects people all around the world. The risk of complications increases with age if the disease is not managed properly. Diabetic neuropathy is caused by excessive blood glucose and lipid levels, resulting in nerve damage. Apelin is a peptide hormone that is found in different human organs, including the central nervous system and adipose tissue. The aim of this study is to estimate Apelin levels in diabetes type 2 and Diabetic peripheral Neuropathy (DPN) Iraqi patients and show the extent of peripheral nerve damage. The current study included 120 participants: 40 patients with Diabetes Mellitus, 40 patients with Diabetic peripheral Neuropathy, and 40 healthy
... Show MoreThe maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreIn this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-
... Show MoreArabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show More