This study aimed to compare the safety and efficacy of laser lithotripsy and pneumatic lithotripsy, the two most commonly used transurethral lithotripsy methods for treating bladder stones in children in Iraq. Between January 2013 and December 2016, 64 children with bladder stones were included in this prospective randomized study, after ethical committee approval and written consent from the children’s parents or caregivers were obtained. Patients were assigned randomly by computer software to two groups treated with either pneumatic cystolithotripsy or laser lithotripsy. A 9 Fr. semirigid ureteroscope was used to pass the lithotripter through and fragment the stone. A catheter of 8–12 Fr. was then introduced and kept in place for 24 h. All children were hospitalized for 24 h, and the catheter was removed the next morning. Outpatient follow-up was maintained for 6–12 months. In terms of operation outcomes and complications, the laser lithotripsy group had a significantly longer duration of operation (74.5 ± 26.6 min vs. 51.5 ± 17.2 min, p = 0.001), whereas the number of patients requiring an extended hospital stay was significantly higher in the pneumatic lithotripsy group (48.5% vs. 16.1%, p = 0.006). Moreover, pneumatic lithotripsy was associated with a significantly greater risk of having at least one adverse effect (64% greater than that in the laser group). Stone clearance rates did not significantly differ between treatment groups. In conclusion, both pneumatic and laser lithotripters can be used to treat children with bladder stones with high efficacy and safety.
This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe lipid profile and adipokines of an adolescent may be affected by some parasite infections. Recently, it has been discovered that these parasites are connected to body mass index (BMI), lipids and adipokines. The current study, therefore, aimed to specify how Toxoplasma gondii (T. gondii) affect BMI, lipid profile and adipokines. This study was conducted in Al Madain hospital, Baghdad from October to December 2022. An ELISA test was performed to examine the anti-T. gondii IgG and IgM for a group of adolescents attending the hospital. Based on this examination ninety adolescents were chosen to be involved in the study. They were separated in to two groups: individuals who tested positive for the parasite (n=45) and those who teste
... Show MoreI n this paper ,we 'viii consider the density questions associC;lted with the single hidden layer feed forward model. We proved that a FFNN with one hidden layer can uniformly approximate any continuous function in C(k)(where k is a compact set in R11 ) to any required accuracy.
However, if the set of basis function is dense then the ANN's can has al most one hidden layer. But if the set of basis function non-dense, then we need more hidden layers. Also, we have shown that there exist localized functions and that there is no t
... Show MoreTaxes are an essential axis in the economy as the most effective and effective economic tool in any country (economy). Expanding the scope of taxation without adequate study has produced a dangerous result with a negative impact that is almost apparent, namely (tax evasion), which stands as a barrier preventing the state from reaching Therefore, the research sought to study strategic tax planning and its importance in reducing tax evasion, and the research aims from that to prove the importance of adopting strategic planning in the field of taxes according to modern and effective scientific foundations to reduce tax evasion to enhance the achievement of tax evasion. The financing objective is in addition to the other objectives,
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis study aimed to identify the degree of frustration and guilt among addicts who hurt themselves with drug, and to know the addicts perspective who are in treatment clinics and rehabilitation centers in Palestine, in order to achieve this goal aDeterminationThe study population has been identified , this study population consisted of ' (82) addict, the researcher used the descriptive analytical method which is appropriate for this study, so the researcher questioned the addicts who are in treatment clinics and rehabilitation centers in Palestine and analyze their responses in light of some of the variables.
The study results showed that drug addicts who ar
... Show MoreThe objective of this paper is to show modern class of open sets which is an -open. Some functions via this concept were studied and the relationships such as continuous function strongly -continuous function -irresolute function -continuous function.
The correct and sincere process of socialization is working on appropriate social climate in
which this process is the provision, and the climate is achieved in the presence of a positive
environment free of negatives and contradictions, but when there is a socialization processes
inadequate and contradictory was not based on the principles of punishment and reward nor a
balance between methods soft and intensity of treatment and interaction with small and
adolescent does not require intensive social care formulas do not create the conditions
essential items required by the successful and effective socialization, the young and the young
people who are going through in such Altanisah and educational operations will be