Background: Polycystic ovarian syndrome is one of the common gynaecological diseases encountered nowadays in the gynaecological clinic. Many criteria and diagnostic test had been evolved to be used with different classifications methods.Objectives: The present study aimed to measure the anti-mullerian hormone levels in serum of the women with Polycystic Ovary Syndrome and to test the possibility that if it can be used as a marker for diagnosis of polycystic ovary syndrome patients.Methods: A cross sectional study that had been conductedat Kamal AL-Samaraee Hospital, AL-Suwayrah Hospital andAl-Elwiya Maternity Teaching Hospital during the periodfrom July, 1st, 2013 – Jan. 1st, 2014. Where forty women withPolycystic ovarian syndrome (with mean body mass index of33.25±6.79kg/m2) were enrolled in the study group andbeing compared to apparently health women as a controlgroup that were matched for age and their (mean bodymass index was 27.63±3.51kg/m2). Clinical history,biochemical and hormonal analysis were determined forboth groups.Results: The mean serum of anti-mullerian hormone showed statically significant difference (P = 0.0001) in poly-Cystic ovarian syndrome patients compare to the controlgroup and when this hormone compared with other hormones that use for predicting the occurrence of PCOS as (LH , FSH , testosterone, prolactin and insulin), anti mullarian hormone showed the highest sensitivity and specificity as 82.10 % and 100 % respectively, with a cut off value of (>7.9) in Iraqi women.Conclusions: Anti - mullerian hormone could be the best marker in comparison with other hormones used for the diagnosis of PCOS.Keywords: Polycystic ovarian syndrome, anti-mullerian hormone, luteinizing hormone, follicular stimulating hormone.
Utilizing phase change materials in thermal energy storage systems is commonly considered as an alternative solution for the effective use of energy. This study presents numerical simulations of the charging process for a multitube latent heat thermal energy storage system. A thermal energy storage model, consisting of five tubes of heat transfer fluids, was investigated using Rubitherm phase change material (RT35) as the. The locations of the tubes were optimized by applying the Taguchi method. The thermal behavior of the unit was evaluated by considering the liquid fraction graphs, streamlines, and isotherm contours. The numerical model was first verified compared with existed experimental data from the literature. The outcomes re
... Show MoreThe Humidification-Dehumidification (HDH) desalination technique offers a viable solution for providing freshwater to populations in water-scarce, remote areas. This study experimentally investigates a novel humidifying method by cross airflow over water-wetted pottery tubes, which function as a humidifier, incorporating a thermoelectric cooler to condense water vapor for freshwater production. To optimize freshwater production and thermal efficiency, meticulous design of these components and appropriate operational parameters are selected. Experiments were performed in three environments with differing temperatures and relative humidity levels, while air velocity varied from 1.02 to 1.89 m/s, and thermoelectric cooler voltage ranged from 6
... Show MoreA fluorescence microscopy considered as a powerful imaging tool in biology and medicine. In addition to useful signal obtained from fluorescence microscopy, there are some defects in its images such as random variation in brightness, noise that caused by photon detection and some background pixels in the acquired fluorescence microscopic images appear wrongly auto-fluorescence property. All these practical limitations have a negative impact on the correct vision and analysis of the fluorescent microscope users. Our research enters the field of automation of image processing and image analysis using image processing techniques and applying this processing and analysis on one of the very important experiments in biology science. This research
... Show MoreThis study confirms the ubiquitin conjugating enzyme 2B (Rad6) plays a significant role in the DNA repair pathway also because the ubiquitin-conjugating pathway. The DNA repair pathway could be a variety of bypass repair mechanism where the broken base pair is bypassed by permitting the replication fork to labor under the site of injury. This is often done by a shift mechanism wherever deoxyribonucleic acid enzyme - δ is switched with DNA enzyme - η (DNAP - η). Site of DNAP - η is massive enough to permit the broken ester to labor under, and so bypass the broken nucleotide. However, this is often potential solely through the involvement of Proliferating cell nuclear antigen (PCNA) that could be a processivity issue and it acts as a plat
... Show MoreThe research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a
... Show MoreTaking into account the significance of food chains in the environment, it demonstrates the interdependence of all living things and has economic implications for people. Hunting cooperation, fear, and intraspecific competition are all included in a food chain model that has been developed and researched. The study tries to comprehend how these elements affect the behavior of species along the food chain. We first examined the suggested model's solution properties before calculating every potential equilibrium point and examining the stability and bifurcation nearby. We have identified the factors that guarantee the global stability of the positive equilibrium point using the geometric approach. Additionally, the circumstances that would gu
... Show MoreEmotions are part of the personality of the individual and affect many different aspects of the personality, and it is an important element of social and psychological adaptation, especially if it is within the limits of nature, and if the methods used to express them are appropriate and moderate.
Submission is one of the characteristics that express the way an individual relies upon in dealing with others and in dealing with matters of life. An individual who complies with instructions and orders and abides by them, and performs what is required of him without hesitation or delay. Adolescence is an important and accurate stage in the constructive development of an individual and in his psychological and social life.
The
... Show More
The present study is about tales attributed to certain people and are not traded. Such a study has a great importance for religion scholars and conveyors of hadiths since it is considered as one of the important sources of Islamic legislation that represent the Holy Sunna, and the majority of the recent study is concerned with non-traded tales of religion scholars. The research starts with the definition of such type of tales and then its types, conditions, legality, exceptions, and the benefit from studying such matter. It is mainly concerned with the opinions of the Imami and Hanafi region scholars respectively, and with comparing between the two doctrines i.e. Imami and Hanafi at the end of each
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.