Extracorporeal shock wave lithotripsy (ESWL) is considered a standard treatment for nephrolith or kidney stones measuring less than 20 mm. Anatomical, machine-related, and stone factors play pivotal roles in treatment outcomes, the latter being the leading role. This paper examined the relationship between stone density on native CT scans and ESWL treatment to remove renal stones concerning several treatments. One hundred and twenty patients (64 males and 56 females) were enrolled and completed the study from April 2019 to September 2020. Inclusion criteria were a single renal pelvis stone of 5–20 mm to be treated for the first time in adult patients with no urinary or musculoskeletal anatomical abnormalities. We assessed patients' renal function and obtained stone characteristics using a native CT scan. Patients were then scheduled for ESWL by the same machine and operator under fluoroscopy, with two-week intervals between treatment sessions when more than one treatment session was required. Before each new session, a new KUB-US was performed to reevaluate the stone. One hundred and twenty patient records were analyzed, 64 (53.3%) males and 56 (46.7%) females, with a mean age of 38.6 years and a mean stone size of 13.15 mm. Treatment with ESWL cleared stones in 76 (63.3%) patients, while 44 (36.7%) failed the treatment. The mean stone density in patients whose stones were cleared was significantly lower (661
Two‐dimensional buoyancy‐induced flow and heat transfer inside a square enclosure partially occupied by copper metallic foam subjected to a symmetric side cooling and constant heat flux bottom heating was tested numerically. Finite Element Method was employed to solve the governing partial differential equations of the flow field and the Local Thermal Equilibrium model was used for the energy equation. The system boundaries were defined as lower heated wall by constant heat flux, cooled lateral walls, and insulated top wall. The three parameters elected to conduct the study are heater length (7 ≤
A Survey Study Of A Sample Of The Public Of Baghdad Governorate
The current study aimed to identify the most prominent psychological and behavioral repercussions of the exposure of the elderly to the news of the Corona pandemic and to determine the mechanisms of their exposure. On an intended sample on both sides of (Al-Karkh and Al-Rasafa) and the simple random sample was adopted to choose the place of distribution of the questionnaire and the intentional sample.
The research concluded several results, most TV news is still a primary source of information and that most of the sample move between stations to see more information about the pandemic and that the presentation of views confuses the elderly ،There
... Show MoreThe study aimed to identify the news framing on the Israeli Arabic-speaking i24 channel of the Israeli aggression on Gaza -2021 by analyzing the channel’s Program “this evening”. The study used the media survey method, and in its framework, it relied on the content analysis method for the program’s episodes from May 5, 2021 AD until June 4, 2021 AD, with 22 episodes. The study showed the program’s interest in launching the Palestinian resistance’s rockets significantly, followed by the Israeli military operations, and the program’s reliance on correspondents largely as a source of news material related to the aggression. It also proved that a news report and a reporter's report was the most important form of presenting news
... Show MoreThis paper presents a numerical simulation of the flow around elliptic groynes by using CFD software. The flow was simulated in a flume with 4m long, 0.4m wide, and 0.175m high with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow inlet with a constant the Groyne height of 10cm and a 1cm thickness, and the width of Groynes equals 7cm. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of 0.0057m3/sec. The CFD model showed a good ability to simulate the flow around Groynes with good accuracy. The results of CFD software showed that when using double elliptic Groy
... Show MoreMixture experiments are response variables based on the proportions of component for this mixture. In our research we will compare the scheffʼe model with the kronecker model for the mixture experiments, especially when the experimental area is restricted.
Because of the experience of the mixture of high correlation problem and the problem of multicollinearity between the explanatory variables, which has an effect on the calculation of the Fisher information matrix of the regression model.
to estimate the parameters of the mixture model, we used the (generalized inverse ) And the Stepwise Regression procedure
... Show MoreWhen writing a text, such as a newspaper article, various types of discourse markers are frequently used to group sentences into paragraphs and parts in order to establish a discourse with certain functions, such as coordination, orientation, emphasizing the concepts presented, etc. It should also be noted that this type of mark exists in both written and spoken language. Therefore, it is convenient to dedicate a chapter to these linguistic elements to clarify their use and their classification, which is mainly based on Jose Portolés (2001), as well as the main features, specifically their features (prosodic, morphological, semantic and pragmatic).
Resumen
... Show More
This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show MoreIn the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More