Background: Computerized tomography scan can show the detailed anatomy of the nose and paranasal sinuses. The sphenoid sinus is a very important corridor for the skull base because of its central position. This sinus has a great range of variation and can put structures around at risk during surgery. This study aims to examine the variation of the sphenoid sinus, and its relation to other structures around it, in this sample of Iraqi patients. Materials and Methods: CT scans of 122 patients, were obtained, and submitted for examination and measurements, during the period between September 2020 and September 2021. Observation of The sphenoid sinus pneumatization pattern, clival extension, Onodi cell, and lateral pneumatization of SS.
... Show MoreAbstract A descriptive study was conducted in Al-Bashir teaching hospital in Amman city from 15th May 2004 to 15th August 2004 , in order to "Assess the adult asthmatic patients’ quality of life (QOL). Objective: This study aimed at identifying the domains of (Environmental, Physical, Daily Living Activity, Drug and Medication, Psychological , and Social), Methodology : A Purposive (Non-Probability) sample of (100) adult asthmatic patients visited the emergency department and outpatient clinic of chest department in Al-bashir hospital .A Questionnaire was constructed for the purpose of the study, and compris
Background: Lumbar disc degeneration (LDD) is a common musculoskeletal disorder that frequently causes low back pain (LBP). In addition to the discomfort of lower back pain, it can accompany pain in one or both legs. The lumbar spine and sacrum, consisting of five vertebrae and one bone, determine the spine's balance. Microelements are essential in bone metabolism and are associated with the prevention of osteoporosis and the alleviation of musculoskeletal pain. Objectives: To examine the correlation between lumbar spinal surgery and the concentrations of microelements, namely zinc and copper. Methods: A case-control study was conducted in Ghazi Al-Hariri Hospital in Baghdad, Iraq, during the period from October 2023 to January 2024
... Show MoreLeishmania tropica is a species of flagellate parasites that infects humans and the cause of the disease cutaneous leishmaniasis, which is the most common form of leishmaniasis. It is one of the major parasites, which have high prevalence than other parasites in Iraq. The aim was to investigate the role of HLA alleles in susceptibility to cutaneous leishmaniasis infection in Baghdad in a sample of Iraqi patients. Cross sectional study (thirty Iraqi Arab Muslims patients with Leishmania tropica infection and thirty Iraqi Arab Muslims healthy persons) were participated in this study. Patients were consulted Department of Dermatology in Medical city Teaching hospital and AL Yarmook Teaching hospital for the period between March 2014 till May 2
... Show MoreXXXX
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
It aim current researchs֬ to identify the impact of a proposed strategy in accordance with the objectives of science in the achievement and some science processes, where the experimental method was adopted, and define the research community was students second grade averag in Education Bagdad / Rusafa third, research sample intentionally chosen as school Radwan, and (30) students experimental group and (29) of control group, research tools were achievement test and the test of science operations and use the appropriate statistical tools to process information and data, showing results, the experimental group surpassed the control group in the collection and operations science, and light it, the researcher recommended several recommendat
... Show MoreBackground: A diverse group of bacteria live in biofilms in the oral cavity. On dental surfaces biofilms form plaque that is potentially involved in caries and periodontal diseases. Periodic studying of plaque microflora and their antimicrobial sensitivity patterns strongly affects the clinical practice in plaque-induced oral diseases. Materials and methods: Dental plaque samples were collected from 22 patients having ages ranged between 33 and 49 years with gingivitis that met the study criteria. Plaque, gingival and gingival bleeding indices (PI, GI, GBI) were measured for each patient. Laboratory procedures included microbiological examination of plaque samples followed by antibiotic sensitivity testing using disc diffusion method were
... Show More