Preferred Language
Articles
/
pxgGdZQBVTCNdQwC7RjT
INNOVATE GESTATIONAL AGE ESTIMATION MODEL FOR IRAQI FETUSES BASED ON ULTRASOUND IMAGES MEASUREMENTS
...Show More Authors

Imaging by Ultrasound (US) is an accurate and useful modality for the assessment of gestational age (GA), estimation fetal weight, and monitoring the fetal growth during pregnancy, is a routine part of prenatal care, and that can greatly impact obstetric management. Estimation of GA is important in obstetric care, making appropriate management decisions requires accurate appraisal of GA. Accurate GA estimation may assist obstetricians in appropriately counseling women who are at risk of a preterm delivery about likely neonatal outcomes, and it is essential in the evaluation of the fetal growth and detection of intrauterine growth restriction. There are many formulas are used to estimate fetal GA in the world, but it's not specify for Iraqi population and leading to some error in GA estimation results, so the objective of this study is to innovate GA estimation model for Iraqi people. This study was performed in the department of Obstetrics and Gynecology in Al- Yarmouk Teaching Hospital and AL- Alawiya Teaching Hospital in Baghdad, Iraq, during 2019 on 200 pregnant women of singleton and normal pregnancies, fetal GA (20-40) weeks (W). The obtained dataset (fetal biometry), were utilized to create GA estimation model in Iraq using IBM SPSS Version 23 software package (IBM^® Software). The statistical analysis of proposed GA model showed, the correlation (R) of model is 0.987 it is very high value and this is a good result to obtain the best regression model. as well as the Std error of Estimation was 0.61095 this is very small value and indicate the best result. The significant of model P=0.000 That means the model, as a whole, is a significant fit to the data (because P < 0.05).

Crossref
View Publication
Publication Date
Sat Sep 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the efficacy of ultrasound in the diagnosis of cervical lymphadenopathy
...Show More Authors

Background: Cervical lymph nodes are prone to involved by a number of pathologic processes. They are common sites for lymphoma, metastasis, and reactive enlargement in a number of conditions. Aims of the study:-Clinical evaluation of patients with cervical lymphadenopathy. Differentiation between benign and malignant lymph nodes by means of ultra sounds (US) and Correlate the US findings with cytological and/or histopathological findings of cervical lymph nodes. Subjects, Materials and Methods:-The present study was carried out over a period of 6 months and included 81 patients of different age groups presenting with cervical lymphadenopathy. Each patient was examined clinically, then comprehensive sonographic examination of the neck for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 10 2024
Journal Name
The Open Neuroimaging Journal
The Efficacy of Bedside Chest Ultrasound in the Detection of Traumatic Pneumothorax
...Show More Authors
Background

Chest X-rays have long been used to diagnose pneumothorax. In trauma patients, chest ultrasonography combined with chest CT may be a safer, faster, and more accurate approach. This could lead to better and quicker management of traumatic pneumothorax, as well as enhanced patient safety and clinical results.

Aim

The purpose of this study was to assess the efficacy and utility of bedside US chest in identifying traumatic pneumothorax and also its capacity to estimate the extent of the lesion in comparison to the gold standard modality chest computed tomography.

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Engineering
ESTIMATION OF RELATIONSHIP BETWEEN COEFFICIENT OF CONSOLIDATION AND LIQUID LIMIT OF MIDDLE AND SOUTH IRAQI SOILS
...Show More Authors

In this paper, a relationship between the liquid limit and the coefficient of consolidation of Iraqi soils are studied. The samples of soil used in study are undisturbed silty clay. These samples are taken from different locations and depths of Middle and South of Iraq by cooperation with Consulting Engineering Bureau- University of Baghdad- College of Engineering. The depth reached about 20 meters. The experimental work is made to calculate the liquid limit and the coefficient of consolidation. From these sites, 280 points are obtained. The relationship between the liquid limit and the coefficient of consolidation is drawn as a curve. This curve is studied and compared with the curve that obtained from other studies. From these curves, it

... Show More
Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Estimation of Testosterone, Estradiol and some Markers in Sera of Iraqi Patients with Benign Prostatic Hyperplasia.
...Show More Authors

Benign prostatic hyperplasia (BPH) is one of the most common disease and major cause of morbidity in elderly men which may lead to bladder outflow obstruction and lower urinary tract symptoms (LUTS). Although sex steroid hormones play fundamental roles in prostate growth, their clinical significance is not completely clear. In the present study we assessed whether serum hormones levels as markers of prostate disease. This study includes (40) patients with benign prostatic hypertrophy and (40) control group with age rang (41-79) and (42-71) years respectively. The following biochemical investigations have been studied: Testosterone, Estradiol (E2), and Prostatic Specific Antigen (PSA) levels using ELISA method which correlated with t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF