Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or tousing another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classifier (NCC). The samples had been taken from 2850 actual sufferers cases that had been treated at Urology and Nephrology center of Iraq. The results from three cases have been compared to actual treatment results of (ESWL) for trained and non-trained cases and compared the results of three models. The results show that (NCC) approach is the most accurate method in prediction the efficient of uses (ESWL) remedy in treatment the kidney stone.
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreBackground: Lamotrigine is a second generation Anti-epileptic drug; it is widely used for the treatment of epilepsy and bipolar disorder. Sufficient data is not available concerning its teratogenicity. Aim of the study: The study has been carried out to evaluate the effect of lamotrigine on Rat kidney development. Materials and Methods: The study was conducted on 10 pregnant Albino Rats (Rattus rattus) divided equally into two groups, control and experiment groups. Experiment group received lamotrigne 10mg/kg/day orally using naso-gastric tube from the first day of gestation until the first week after birth, while the control group received distilled water. Newborn kidneys were collected at day 7 postnatal and fixated in bouin’s solution,
... Show MoreMeloxicam is a non-steroidal anti-inflammatory drug. It is practically insoluble in water. It is associated with gastrointestinal side effects at high doses on long term treatment. The aim of this investigation to formulate and evaluate gellified nanoemulsion of meloxicam as a topical dosage form to enhance meloxicam therapeutic activity and reduce systemic side effect.
The pseudo ternary phase diagrams were made, including the oil mixture which is composed of almond oil and peppermint oil at a ratio (1:2), variable surfactant mixture (S mix) which are tween 80 and ethanol at ratios of (1:1, 2:1, 3:1, and 4:1) and double distilled water. Slow dripping of double distilled water to the combination of the oil mixtu
... Show MoreCoronavirus disease 2019 (COVID-19) is a flu-like infection caused by a novel virus known as Severe Acute Respiratory Syndrome coronavirus 2 (SARS-CoV-2). After the widespread around the world, it was announced by the World Health Organization (WHO) as a global pandemic. The symptoms of COVID-19 may arise within 2 weeks and the severity ranged from mild with signs of respiratory infection to severe cases of organ failure and even death. Management of COVID-19 patients includes supportive treatment and pharmacological medications expected to be effective with no definitive cure of the disease. The aims of this study are highlighting the management protocol and supportive therapy especially vitamin D and manifesting the clinical symptoms b
... Show MoreThe new antiepileptic drugs, levetiracetam (LEV), are used to treat tonic-clonic seizures and myoclonic seizures in adults and children. Thirty pregnant rats were enrolled, which were divided into two groups A control (10), B treated (20). Group (A) were given distilled water orally for 15 days of pregnancy period. The other group was subdivided into two subgroups B1, B2 (each with 10 rats), which were treated with LEV for 14 days for subgroup (B1) and 15 days for the other subgroup (B2). The drug (350 mg/kg/day) is administered orally. Based on our results there was damage in the kidney due to the toxicity of the drug. The histopathological effects is represented
... Show More
Summary:
We are aware that we cannot reach a correct level of understanding of the Arabic language without using the Quran as our main source in our research. Since the word of the Quran that put an end to all words which kneeled before it all the phrases that lead to the showcasing of the Arabic language in its best self.
Arab scientist realized this truth and gave all their attention to the singular and created from it an important subject for their research in the origins of the language and the science behind. Thus, since they dealt with the structure and studied the significance of the context through the use of vocabulary. Therefore, researching Islamic words or the “surat” mentioned in the Qur’an was necessar
The basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreAuthentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi