Infection with the protozoan parasite Toxoplasma gondii is widely prevalent in humans and animals. Infection with Toxoplasma may associate with miscarriage in many pregnant women due to infection. In this study, the level of lutetropic hormone (LTH), folliclestimulating hormone (FSH) and luteinizing hormone (LH) was measured in pregnant women suffering from toxoplasmosis using mini-VIDAS®technique. Results showed that pregnant women have high concentration of both LTH and FSH hormone(10.80 ± 6.53) ng/ml and (9.51 ± 2.40) μIU/ml respectively, while the concentration of LH hormone was lower than normal(4.49 ± 0.56) μIU/ml. Such finding is to suggest that infection with T. gondii is interfering with these hormones in pregnant women.
Abstract: The term extremism refers to the distance from moderation, excess and hyperbole, and it is a relative term that varies from one society to another, according to the prevailing traditions, values and culture, as the problem of extremism is one of the main issues that contemporary societies are concerned with is a phenomenon that has its roots in the intellectual formation of societies. By knowing the concept of extremism, we can identify the reasons that contributed to the existence of extremism as a phenomenon, on the one hand; on the other hand, to clarify the role of women in combating extremism and developing effective solutions to reduce this phenomenon. As women play a major role in society, starting from the family to educa
... Show MoreIn this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified. This authentication carries out without need to exist the original image. The results show the quality of the watermarked image is remaining very good and the watermark survived some type of unintended modification such as familiar compression software like WINRAR and ZIP
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel values in a binary document could introduce irregularities that are very visually noticeable. In this paper, a new method is proposed for object-based text document authentication, in which I propose a different approach where a text document is signed by shifting individual words slightly left or right from their original positions to make the center of gravity for each line fall in with the m
... Show MoreBackground: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),
... Show MoreOnline service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreThis study dealt with the basics of financial inclusion in terms of concept, importance and objectives, The empowerment of women financially and bank ,and then the relationship between financial inclusion and women, and determine the requirements of inclusion Financial resources for women. The analytical descriptive method was used for data, which included reviewing and analyzing information and data in economic and financial literature. The study: reached a number of conclusions, the most important of which are Financial inclusion contributes to women's financial and banking support, as there is a positive relationship between financial institutions Banking and women's access to financial and banking services, thus playing a rol
... Show MoreThe current research aims to provide a conceptual and applied frame on the subject of multi- level analysis in the research of business administration. The research tries to address some of the problems that befall the preparation of research and studies at the Arab level and local level, where the unity of theory and measurement and analysis, as well as clarify the various types of conceptual constructs and give researchers the ability to distinguish different models related to the level of analysis. On the other hand, this research provides an example of
... Show More