Perimenopausal bleeding, is a very common problem, which is an alarming symptom for both; women and their doctors because of the rising fears of cellular changes or tumor of endometrium. In our study we tried to prove that collecting endometrial samples using the outpatient method of Pipelle is as effective as collecting the endometrial samples in the traditional method of Dilation and Curettage (DandC) in operation theatre which necessitates general anesthesia. Ninety four patients more than 40 years old were included in the study, all of them were complaining of abnormal uterine bleeding (pregnant ladies and ladies using hormonal contraception were excluded from the study) and endometrial samples were collected first in outpatient clinic using the Pipelle and labelled as A samples and secondly in the theatre under general anesthesia by dilatation and curettage and labelled as B samples, all samples were sent for histopathology without informing the pathologist about the method of sample collection and patients past medical history. Then, the reports of histopathological examination were compared between Pipelle and DandC samples (group A and group B). From the results we can conclude that samples of endometrium using Pipelle could replace the traditional method of DandC, with high specificity and sensitivity in detecting endometrial carcinoma and endometrial hyperplasia.
Arbuscular mycorrhizal fungi and sulphur foam added either at direct seeding or at transplanting decreased the effects of nematode (Meloidogyne javanica) on eggplant growth, and improved plant health. Experiments were conducted to study the possible interactions between the Mycorrhizal fungi (Glomus mossae and Gigaspora spp.) and sulphur foam to control M. javanica on eggplant at seed or seedling stage. Experiment at seed stage treated with Mycorrhiza or sulphur foam alone or together stimulated the growth and reduced Nematode infestation significantly. Treated plant at seedling stage increased plant growth and reduced the number of galls /gm of root system. The interaction between Mycorrhiza and sulpher foam treatments was not significant
... Show MoreObjective: To compare distal tibia nonunion plating and grafting with and without platelet-rich plasma (PRP) regarding union rate, union time and complications Conclusion: Combining PRP with autologous bone graft results in a higher union rate, less healing duration, less post-operative pain, and more callus formation. (Rawal Med J 202;45:629- 632). Methodology: In this prospective comparative study, 32 patients with nonunion tibia from July 2017 January 2019 were divided into two groups: group A (16 cases) were treated by plating and grafting with PRP and group B (16 cases) were treated by plating and grafting only. Keywords: Tibial nonunion, bone graft, plateletrich plasma. Results: There was higher union rate in group A related to group
... Show MoreThe Vogue of the Restoration Comedy of Manners and George Etherage's The Man of Mode; or, Sir Fopling Flutter
هدفت الدراسة الحالية الى التعرف ما اذا كان هناك تقبل اجتماعي للتلاميذ بطيئي من قبل اقرانهم العاديين؟ وكذلك معرفة ما اذا كان هناك فروق ذات دلالة في التقبل الاجتماعي بين افراد عينة الدراسة على وفق المتغيرات الاتية:
أ- العمر (9-13)
ب- الجنس (ذكور –اناث)
ج- المرحلة الدراسية
د- الحالة الاقتصادية (جيدة –متوسطة –جيدة جدا)
ولغرض تحقيق اه
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More