
Background: Ultrasound guided core needle biopsy is becoming a gold standard in the work up of suspicious breast lesion. In Iraq, radiologists are not taking the lead in core needle biopsy performance.
Objectives: To evaluate the radiologist performance of core needle biopsy highlighting the precession and accuracy of the procedure, the concordance of ultrasound and histopathology, and identifying challenges facing the radiologist during the procedure.
Subjects and Methods: A prospective study involving a total of 50 patients with ultrasound (US) BIRADS IV or V. Ultrasound guided core needle biopsy was performed for each patient. Surgical pathol
... Show MoreBackground: Acute appendicitis is the most common surgical abdominal emergency with a life time prevalence of 1 to 7 individuals. Because the clinical diagnosis of acute appendicitis remains a challenge to surgeons, so different aids were introduced like different scoring systems, computer aided programs, ultrasonography, computerized tomography, Magnetic resonance imaging, Gastrointestinal tract contrast studies and laparoscopy to improve the diagnostic accuracy.
Objective: To evaluate ultrasound in the diagnosis of acute appendicitis in those patients clinically diagnosed with histopathology as gold standard.
Methods: A cross sectional study carried in Al-kindy Teaching
... Show MoreThe electrocardiogram (ECG) is the recording of the electrical potential of the heart versus time. The analysis of ECG signals has been widely used in cardiac pathology to detect heart disease. The ECGs are non-stationary signals which are often contaminated by different types of noises from different sources. In this study, simulated noise models were proposed for the power-line interference (PLI), electromyogram (EMG) noise, base line wander (BW), white Gaussian noise (WGN) and composite noise. For suppressing noises and extracting the efficient morphology of an ECG signal, various processing techniques have been recently proposed. In this paper, wavelet transform (WT) is performed for noisy ECG signals. The graphical user interface (GUI)
... Show MoreThe actual observations for Jupiter radio storm were taken for Hawaii station within multi years from 2001 to 2012. The Central Meridian Longitude (CMLІІІ) and Io's phase (γIo) were calculated for each year from Radio Jove program, the results of CMLІІІ for year 2006 was A=(180-300)º,B=(15-239)º, C=(60-280)º, phase was A=(182-260)º,B=(40-109)º, C=(200-260)º, which were close to the theoretical values, longitude was A=(180-300)º, B=(15-240)º, C=(60-280)º and phase was A=(180-260)º,B=(40-110)º and C=(200-260)º.
This work include synthesized and characterization the compound [I] by reaction 1,4-phenylenediamine with chloro acetic acid then this compound reaction with methanol in present sulfuric acid to synthesized ester compound [II] after that reaction with hydrazine hydrate to synthesized acide hydrazide [III] and the later compound reaction with substituted acetophenone[IV]n to synthesized substituted acetophenone hydrazones[V-XI]. In addition synthesized4-formylpyrazole derivatives [XIIXVIII] via cyclisation substituted acetophenone hydrazones [V-XI] with Vilsmeier-Haack reagent DMF/POCl3. The compounds characterized by melting points, FTIR, 1HNMR and mass spectroscopy. The mesomorphic behavior studied by using polarized optical microscopy and
... Show MoreAfter Zadeh introduced the concept of z-number scientists in various fields have shown keen interest in applying this concept in various applications. In applications of z-numbers, to compare two z-numbers, a ranking procedure is essential. While a few ranking functions have been already proposed in the literature there is a need to evolve some more good ranking functions. In this paper, a novel ranking function for z-numbers is proposed- "the Momentum Ranking Function"(MRF). Also, game theoretic problems where the payoff matrix elements are z-numbers are considered and the application of the momentum ranking function in such problems is demonstrated.
Sixteen new complexes with the general formula [M(L)2(H2O)2] were prepared resulting from the reaction of the two new Schiff base ligands, which are: - L1= (E)-5-((2-hydroxybenzylidene)amino)-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) L2 = (E)-5-((2-hydroxy-3-methoxybenzylidene)amino)-2-phenylpyrazolidin-3-one) With divalent metal ions (manganese, cobalt, nickel, copper, zinc, cadmium, mercury) and (tetravalent platinum). Ligands was derived from the reaction of the amine (5-amino-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) with Salicylaldehyde and ortho-vanillin, which is linked to the metal ions via the nitrogen atoms are the isomethene group and the oxygen is the hydroxide group of t
... Show MoreBackground: Bladder cancer (BC) is the most common malignant tumor in the urinary tract and the tenth most common malignancy worldwide. Exosomes are 40–100 nm-diameter nanovesicles that are either released straight from the plasma membrane during budding or merged with the plasma membrane by multivesicular bodies. Objectives: To assess the proportion of serum and urinary Exosome levels in urinary bladder cancer patients, as well as their impact on the disease. Methods: From January 2023 to June 2023, a total of 45 samples of blood and urine were collected from individuals diagnosed with bladder cancer at the Ghazi Hariri Hospital for Specialized Surgery. They included 45 male and female patients, varying in age, as well as 45 heal
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show More