Background: The clinical examination is one of the best suitable methods for diagnosis of low backache. Backache is one disease that the signs, clinical examination finding, and the results on imaging modalities not always related. The straight leg raising (SLR) and slump tests, can be used for diagnosis of lumber disc herniation. Objectives: To compare the result of the slump test and SLR test in the diagnosis of lumber disc herniation. Subjects and Methods: A prospective comparative study conducts on 280 patients in Al-Kindy teaching and private clinics complaints of backache, aging between 18-70 years old with acute or recurrent backache, sciatica pain, or low back and sciatica pain for last 12 weeks, while patients with spinal surgery, sacroiliac joints pain, cervical dysfunction and hip and knee pathology, and chronic illness were excluded. MRI of the lumbar region was done and clinically examine first by SLR test then Slump test on the next days by separated author. All the record collected patient’s data are interpreted with the MRI finding by the third doctor. Results: The Slump test is significant than the SLR in the patients with disc herniation at L4-L5 and (L4-5 &L5S1) 93.1% versus 70%, while for L5S1 level no significant in both tests. Leg pain present in 74.1 %, low back and leg pain in 21.5%, and only 4.4% present with low back only. Conclusion: The Slump test is more sensitive than the SLR test in diagnosis of lumber disc herniation.
Objective: To assess the effect of six-minute walk test on health-related quality of life in patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases. Material: This descriptive study was conducted from 8th August, 2022 to 10th January, 2023. A non-probability purposive sample of 50 patients undergoing coronary artery bypass graft surgery at Iraqi center for heart diseases was included in the study. A questionnaire composed of three parts; sociodemographic and clinical data, six-minute walk test (6MWT) and health-related quality of life (HRQoL) were used. SPSS version 26 was utilized to analyze data. Results: Patient’s performance showed highly significant statistical differences at p<0.05 betw
... Show MoreIn this paper we have dealt with the word " בַּיִת" in the Book of Joshua because it makes one of those that highly employed the word בַּיִת" " in the Old Testament. The Book of Joshua comes sixth in the order of tanakh wich was written by Joshua son of Noon in Palestine during the fifteenth century B.C. and it covers a three-decade era extending from the death of Moses til the death of Joshua son of Noon.
The word " בַּיִת " in this paper refers to the place, where expressions are made by a noun modified by a noun . The modifier is"" בַּיִת , and the modified is another noun. Herein, we
... Show MoreA LiF (TLD-700) PTFED disc has adiameter of (13mm) and thickness of (0.4mm) for study the response and sensetivity of this material for gamma and beta rays by using (TOLEDO) system from pitman company. In order to calibrate the system and studying the calibration factor. Discs were irradiated for Gamma and Beta rays and comparing with the theoretical doses. The exposure range is between 15×10-2 mGy to 1000×10-2 mGy. These doses are within the range of normal radiation field for workers.
Contemporary life is racing against time in its temptations and variables, and it has become shaped and changed in an amazing way in its various aspects and fields. This was facilitated by intellectual and scientific communication between civilizations, and the rapid progression in successive inventions and discoveries in the fields of science and arts of knowledge. This contributed to a great economic and commercial renaissance. Then, these economic developments entered the world into a very strong competition, which forced producers to calculate all production costs, to reach the highest profits by reducing the price of the produced commodity on the one hand, and achieving quality in appearance (especially) on the other hand. Since the ma
... Show MoreThe right to property is one of the most prominent and most important of the fundamental rights that the individual enjoys, whether national or foreign, both of them have their own private property that may not be affected except for the requirements of the country's economic development or what is known as the public benefit, and the Iraqi legislator did not specify what is meant by the removal of foreign investment. Of the bilateral international agreements (BITS), as it determined its terms and methods, the properties of foreign investors may be expropriated in a direct and indirect way.
In this paper, the human robotic leg which can be represented mathematically by single input-single output (SISO) nonlinear differential model with one degree of freedom, is analyzed and then a simple hybrid neural fuzzy controller is designed to improve the performance of this human robotic leg model. This controller consists from SISO fuzzy proportional derivative (FPD) controller with nine rules summing with single node neural integral derivative (NID) controller with nonlinear function. The Matlab simulation results for nonlinear robotic leg model with the suggested controller showed that the efficiency of this controller when compared with the results of the leg model that is controlled by PI+2D, PD+NID, and F
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More