Extracorporeal shock wave lithotripsy (ESWL) is considered a standard treatment for nephrolith or kidney stones measuring less than 20 mm. Anatomical, machine-related, and stone factors play pivotal roles in treatment outcomes, the latter being the leading role. This paper examined the relationship between stone density on native CT scans and ESWL treatment to remove renal stones concerning several treatments. One hundred and twenty patients (64 males and 56 females) were enrolled and completed the study from April 2019 to September 2020. Inclusion criteria were a single renal pelvis stone of 5–20 mm to be treated for the first time in adult patients with no urinary or musculoskeletal anatomical abnormalities. We assessed patients' renal function and obtained stone characteristics using a native CT scan. Patients were then scheduled for ESWL by the same machine and operator under fluoroscopy, with two-week intervals between treatment sessions when more than one treatment session was required. Before each new session, a new KUB-US was performed to reevaluate the stone. One hundred and twenty patient records were analyzed, 64 (53.3%) males and 56 (46.7%) females, with a mean age of 38.6 years and a mean stone size of 13.15 mm. Treatment with ESWL cleared stones in 76 (63.3%) patients, while 44 (36.7%) failed the treatment. The mean stone density in patients whose stones were cleared was significantly lower (661
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreIn accounting studies, more than one method is used to measure income and balance sheets elements. One of these methods is called the fair value, which use to determine the assets and liabilities ad it includes the benefits or self-satisfaction ability. This paper aims to focus on the importance of fair value as a basis of accounting measurement and its effects to achieve the relevant characteristics by using the equation is used by (Kythreotis) in his research, And Also , Editing this equation depending on the financial data and information of Iraqi Banks as a case.
A group of amine derivatives [4-aminobenzenesulfonamide derivatives, 2-aminopyridine and 2-aminothiazole] incorporated to α-carbon of diclofenac a well known non-steroidal anti-inflammatory drug (NSAID) to increase bulkiness were designed and synthesized for evaluation as a potential anti-inflammatory agents with expected COX-2 selectivity. In vivo acute anti-inflammatory activity of the selected final compounds (9, 12 and 13) was evaluated in rats using egg-white induced edema model of inflammation in a dose equivalent to (3 mg/Kg) of diclofenac sodium. All tested compounds produced a significant reduction in paw edema with respect to the effect of propylene glycol 50
... Show MoreThe research aims to identify the extent to which Iraqi private banks practice profit management motivated by reducing the taxable base by increasing the provision for loan losses by relying on the LLP it model, which consists of a main independent variable (net profit before tax) and independent sub-variables (bank size, total debts to total equity, loans granted to total obligations) under the name of the variables governing the banking business. (Colmgrove-Smirnov) was used to test the normal distribution of data for all banks during the period 2017-2020, and then find the correlation between the main independent variable sub and the dependent variable by means of the correlation coefficient person, and then using the multiple
... Show MoreThis research examines how Al-Sabah newspaper addressed violations of women’s rights in Iraq. Using content analysis, a sample of 157 articles published from July 1, 2021, to December 31, 2021, was analyzed. The study reveals diverse journalistic treatments, with interpretive approaches employed in addressing violations of Iraqi women’s rights. Social violations of women’s rights were the primary focus, and various forms of newspaper articles, including opinion pieces, were commonly used.
The current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show More