Preferred Language
Articles
/
jkmc-89
Step-up protocol gonadotrophin versus laparoscopic ovarian drilling in clomiphene citrate resistant PCOS infertile women in two Iraqi hospitals
...Show More Authors

Background: Polycystic ovarian syndrome is a common endocrine disorder affecting 6-10% of women of reproductive age and the most common cause of anovulatory infertility.

Objective: The aim of the study was to compare the effectiveness, side effects and outcomes of step-up gonadotrophin protocol versus laparoscopic ovarian diathermy (LOD) in infertile patients with clomiphene citrate resistant polycystic ovary syndrome.

Methods:  The sample included women who attended our infertility clinic at Al-Elwiya Maternity Teaching Hospital and Kamal Al-Samarraee for Infertility and IVF Hospital in Baghdad/ Iraq from November 2013 to November 2014.    Eighty cases of infertile women with polycystic ovarian syndrome who failed to ovulate with clomiphene citrate for six months where collected, forty women treated with step-up protocol with low dose recombinant FSH gonadotrophin which increased gradually according to ovulation response, another forty women treated with LOD. Ovulation monitoring in each group was done with transvaginal ultrasound to exclude monofollicullar, bifollicular ovulation, ovarian hyperstimulation syndrome, multiple pregnancy and pregnancy rate in each cycle for 6 cycles.

Results: Higher unifollicular ovulation and pregnancy rate in LOD than step-up protocol (91.4% & 25% versus 75% & 10%) respectively, while multifollicular and hyperstimulation rate were higher in gonadotrophin group (24.3% & 0.1% versus 8.50% & nil) respectively.

Conclusion: Ovulation induction and pregnancy rate per cycle was higher with LOD group, not time consuming, also there was no risk of hyperstimulation of the ovary or twin pregnancy as compared to the step-up protocol with gonadotrophin

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 23 2018
Journal Name
International Journal Of Quantum Information
Key rate estimation of measurement-device-independent quantum key distribution protocol in satellite-earth and intersatellite links
...Show More Authors

In this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Impact of Denial-of-Service Attack on Directional Compact Geographic Forwarding Routing Protocol in Wireless Sensor Networks
...Show More Authors

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 26 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE OF FINANCIAL INCLUSION IN PROVIDING FINANCIAL SUPPORT WOMEN IN IRAQ: THE ROLE OF FINANCIAL INCLUSION IN PROVIDING FINANCIAL SUPPORT WOMEN IN IRAQ
...Show More Authors

This study dealt with the basics of financial inclusion in terms of concept, importance and objectives, The empowerment of women financially and bank ,and then the relationship between financial inclusion and women, and determine the requirements of inclusion Financial resources for women. The analytical descriptive method was used for data, which included reviewing and analyzing information and data in economic and financial literature. The study: reached a number of conclusions, the most important of which are Financial inclusion contributes to women's financial and banking support, as there is a positive relationship between financial institutions Banking and women's access to financial and banking services, thus playing a rol

... Show More
View Publication Preview PDF
Publication Date
Sat May 19 2012
Journal Name
Wireless Personal Communications
Stable-Aware Evolutionary Routing Protocol for Wireless Sensor Networks
...Show More Authors

Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jul 07 2024
Journal Name
Pakistan Journal Of Life And Social Sciences
Antibacterial Activity of Silver Nanoparticles Prepared from Camellia Sinensis Extracts in Multi-Drug Resistant Pseudomonas aeruginosa
...Show More Authors

The purpose of this study to synthesize and characterize silver nanoparticles using phenolic compounds obtained from Camellia sinensis, to test the antibacterial properties of biosynthesized nanoparticles on the formation of biofilms in multidrug-resistant Pseudomonas aeruginosa. Ten isolates of P. aeruginosa were obtained from the Genetic Engineering and Biotechnology Institute laboratories of the University of Baghdad. By using the VITEK-2 system and culturing the isolates on cetrimide agar, the diagnosis was confirmed. Camellia sinensis silver nanoparticles (CAgNPs) were created using an extract of the plant's aqueous and methanolic leaves. Based on the results of the nanoparticle synthesis, spherical nanoparticles that may be single or

... Show More
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Systematic Reviews In Pharmacy
A Study On The Effects Of Risk Factors On The Pathology And The Development Of Breast Cancer In Iraqi Women
...Show More Authors

Breast cancer is one of the most important malignant diseases all over the world. The incidence of breast cancer is increasing around the world and it is still the leading cause of cancer mortality An Approximately 1.3 million new cases were diagnosed worldwide last year. With areas rising increasing, risk factors for breast cancer including obesity, early menarche, alcohol and smoking, environmental contamination and reduced or late birth rates become more prevalent. In Iraq, breast cancer ranks first among types of cancers diagnosed in women. This study was conducted on one hundred twenty women with breast cancer that was evaluated and investigated for the possible role of the risk factors on the development of breast cancer in females. T

... Show More