Perimenopausal bleeding, is a very common problem, which is an alarming symptom for both; women and their doctors because of the rising fears of cellular changes or tumor of endometrium. In our study we tried to prove that collecting endometrial samples using the outpatient method of Pipelle is as effective as collecting the endometrial samples in the traditional method of Dilation and Curettage (DandC) in operation theatre which necessitates general anesthesia. Ninety four patients more than 40 years old were included in the study, all of them were complaining of abnormal uterine bleeding (pregnant ladies and ladies using hormonal contraception were excluded from the study) and endometrial samples were collected first in outpatient clinic using the Pipelle and labelled as A samples and secondly in the theatre under general anesthesia by dilatation and curettage and labelled as B samples, all samples were sent for histopathology without informing the pathologist about the method of sample collection and patients past medical history. Then, the reports of histopathological examination were compared between Pipelle and DandC samples (group A and group B). From the results we can conclude that samples of endometrium using Pipelle could replace the traditional method of DandC, with high specificity and sensitivity in detecting endometrial carcinoma and endometrial hyperplasia.
This descriptive research aims atidentifying the difficulties encountered by nursing students in the development of nursing diagnostic skills. The data collection was carried out using a direct questionnaire with 62 students in My Youssef’s hospital in Casablanca. The results of the study list a set of failures related to the training of nurses. This training focuses mainly on the acquisition of knowledge; it is not aimed to the development of the real skill.
As a result of the significance of image compression in reducing the volume of data, the requirement for this compression permanently necessary; therefore, will be transferred more quickly using the communication channels and kept in less space in memory. In this study, an efficient compression system is suggested; it depends on using transform coding (Discrete Cosine Transform or bi-orthogonal (tap-9/7) wavelet transform) and LZW compression technique. The suggested scheme was applied to color and gray models then the transform coding is applied to decompose each color and gray sub-band individually. The quantization process is performed followed by LZW coding to compress the images. The suggested system was applied on a set of seven stand
... Show MoreBinary mixtures of three heavy oil-stocks had been subjected to density measurments. The data had been aquired on the volumetric behaviour of these systems. The heavy oil-stocks used were of good varity, namely 40 stock , 60 stock, and 150 stock, 40 stock is the lightest one with the API gravity 33.7 while 60 stock is middle type and 150 stock is heavy one, with API gravity 27.7 and 23.8 respectively. Stocks with Kerosene or Xylene for non-ideal mixtures for which excess volume can be positive or negative. Mixture of heavy-oil stocks with paraffinic spike (Kerosene) show negative excess volume. While, aromatic rings results a lower positive excess volume, as shown in Xylene when blending with 40 stock and 60 stock but a negati
... Show MoreBackground: perniosis is a common dermatological problem. Different modalities of treatment are available with conflicting results and no single effective therapy is universally accepted.
Objective: To evaluate the effectiveness of oral tadalafil and compare it with pentoxyfylline or prednisolone in treatment of perniosis
Patients and methods: This was a therapeutic comparative trial conducted in the department of Dermatology, Baghdad Teaching hospital, Baghdad, Iraq between November 2011 and March 2014.
Fifty eight patients with perniosis were enrolled in this study, and divided into 3 groups. Group (A) comprised 19 patients who received oral tadalafil (5 mg once daily); group (B) comprised 18 patients who received pentoxifylli
The present study focused mainly on the buckling behavior of composite laminated plates subjected to mechanical loads. Mechanical loads are analyzed by experimental analysis, analytical analysis (for laminates without cutouts) and numerical analysis by finite element method (for laminates with and without cutouts) for different type of loads which could be uniform or non-uniform, uniaxial or biaxial. In addition to many design parameters of the laminates such as aspect ratio, thickness ratio, and lamination angle or the parameters of the cutout such as shape, size, position, direction, and radii rounding) which are changed to studytheir effects on the buckling characteristics with various boundary conditions. Levy method of classical lam
... Show MoreBackground: The healing of a sutured tendon in the hand usually occur with an unwanted amount of scarring that defeat good results. Many variables has been studied over many decades; timing of repair M’as a matter of debate. Zone II is the area where those variables mostly affect the results of treatment.
Objective: To study and evaluate the results of early or delayed repair under the effects of our local variables.
Method: Prospective study of 85 patients, which had flexor tendon repair at zone II by primary repair, delayed primary repair and tendon graft.
Results: Results showed a primary repair ended with better functional results than those with delayed repair and than those with tendon graft. Excellent & good results
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreIn modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More