Preferred Language
Articles
/
jkmc-89
Step-up protocol gonadotrophin versus laparoscopic ovarian drilling in clomiphene citrate resistant PCOS infertile women in two Iraqi hospitals
...Show More Authors

Background: Polycystic ovarian syndrome is a common endocrine disorder affecting 6-10% of women of reproductive age and the most common cause of anovulatory infertility.

Objective: The aim of the study was to compare the effectiveness, side effects and outcomes of step-up gonadotrophin protocol versus laparoscopic ovarian diathermy (LOD) in infertile patients with clomiphene citrate resistant polycystic ovary syndrome.

Methods:  The sample included women who attended our infertility clinic at Al-Elwiya Maternity Teaching Hospital and Kamal Al-Samarraee for Infertility and IVF Hospital in Baghdad/ Iraq from November 2013 to November 2014.    Eighty cases of infertile women with polycystic ovarian syndrome who failed to ovulate with clomiphene citrate for six months where collected, forty women treated with step-up protocol with low dose recombinant FSH gonadotrophin which increased gradually according to ovulation response, another forty women treated with LOD. Ovulation monitoring in each group was done with transvaginal ultrasound to exclude monofollicullar, bifollicular ovulation, ovarian hyperstimulation syndrome, multiple pregnancy and pregnancy rate in each cycle for 6 cycles.

Results: Higher unifollicular ovulation and pregnancy rate in LOD than step-up protocol (91.4% & 25% versus 75% & 10%) respectively, while multifollicular and hyperstimulation rate were higher in gonadotrophin group (24.3% & 0.1% versus 8.50% & nil) respectively.

Conclusion: Ovulation induction and pregnancy rate per cycle was higher with LOD group, not time consuming, also there was no risk of hyperstimulation of the ovary or twin pregnancy as compared to the step-up protocol with gonadotrophin

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat May 19 2012
Journal Name
Wireless Personal Communications
Stable-Aware Evolutionary Routing Protocol for Wireless Sensor Networks
...Show More Authors

Scopus (36)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Two Phase Flow in Large Diameter Pipe
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Jul 01 1996
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
TWO PRIMITIVE ORIBATIDS: FIRST RECORD IN IRAQ
...Show More Authors

Cosmochthonius reticulatus Grandjean, 1947 (Acari: Oribatei: Cosmochthoniidae) and Rhysotritia ardua ardua C. L. Koch, 1841 ( Acari : Oribate : Euphthiracari¬dae), are two species of oribatids mites first recorded in Iraq from a woodland in the central part of Iraq. The two species are described and illustrated.

View Publication Preview PDF
Publication Date
Mon Apr 23 2018
Journal Name
International Journal Of Quantum Information
Key rate estimation of measurement-device-independent quantum key distribution protocol in satellite-earth and intersatellite links
...Show More Authors

In this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
...Show More Authors

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The market value between the two dilemmas of profit distribution and retention: an analytical study in the Iraqi stock market
...Show More Authors

Abstract:

             The distribution or retention of profits is the third decision among financial management decisions in terms of priority, whether at the level of theory or practice, as the issue of distribution or retention is multi-party in terms of influence and impact, as determining the optimal percentage for each component is still the subject of intellectual debate because these decisions are linked to the future of the organization and several considerations, The research focus on the nature of the policies followed by the Iraqi banking sector As the sample chosen by the intentional sampling method was represented by the Commercial Bank of

... Show More
View Publication Preview PDF