Background: Behçet’s disease (BD) is a disorder of systemic inflammatory condition. Its important features are represented by recurrent oral, genital ulcerations and eye lesions. Aims. The purpose of the current study was to evaluate and compare cytological changes using morphometric analysis of the exfoliated buccal mucosal cells in Behçet’s disease patients and healthy controls, and to evaluate the clinical characteristics of Behçet’s disease. Methods. Twenty five Behçet’s disease patients have been compared to 25 healthy volunteers as a control group. Papanicolaou stain was used for staining the smears taken from buccal epithelial cells to be analyzed cytomorphometrically. The image analysis software has been used to evaluate cytoplasmic, nuclear areas and the nuclear/cytoplasmic ratio (N/C). Results. The cytoplasmic and nuclear area of buccal cells of Behçet’s disease cases were significantly smaller than those of healthy volunteers. However, the N/C ratio remained the same when compared between both groups. All patients had recurrent oral ulcer and none of the patient had cardiac and pulmonary symptoms. Conclusion. Cytomorphometric analysis and exfoliative cytology techniques have the ability to detect the alterations in buccal epithelial cells caused by Behçet’s disease.
The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit
... Show MoreThis paper aims to study the second-order geometric nonlinearity effects of P-Delta on the dynamic response of tall reinforced concrete buildings due to a wide range of earthquake ground motion forces, including minor earthquake up to moderate and strong earthquakes. The frequency domain dynamic analysis procedure was used for response assessment. Reinforced concrete building models with different heights up to 50 stories were analyzed. The finite element software ETABS (version 16.0.3) was used to analyze reinforced concrete building models.
The study reveals that the percentage increase in buildings' sway and drift due to P-Delta effects are nearly constant for specific building height irrespective of the seism
... Show MoreA new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever
... Show MoreIn this work, strains and dynamic crack growth were studied and analyzed in thin flat plate with a surface crack at the center, subjected to cycling low velocity impact loading for two types of aluminum plates (2024, 6061). Experimental and numerical methods were implemented to achieve this research. Numerical analysis using program (ANSYS11-APDL) based on finite element method used to analysis the strains with respect to time at crack tip and then find the velocity of the crack growth under cycling impact loading. In the experimental work, a rig was designed and manufactured to applying the cycling impact loading on the cracked specimens. The grid points was screened in front of the crack tip to measure the elastic-plas
... Show MoreAbstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreTwo dimensional meso-scale concrete modeling was used in finite element analysis of plain concrete beam subjected to bending. The plane stress 4-noded quadrilateral elements were utilized to model coarse aggregate, cement mortar. The effect of aggregate fraction distribution, and pores percent of the total area – resulting from air voids entrapped in concrete during placement on the behavior of plain concrete beam in flexural was detected. Aggregate size fractions were randomly distributed across the profile area of the beam. Extended Finite Element Method (XFEM) was employed to treat the discontinuities problems result from double phases of concrete and cracking that faced during the finite element analysis of concrete beam. Crac
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show More