Bladder dysfunction is one of the most common complications of diabetes, even exceeding nephropathy or peripheral neuropathy. Diabetic cystopathyaffects patients in both sexes, and its prevalence increases over time with diabetes; our concern is to evaluate the urodynamic findings of bladder dysfunction in diabetic patients.A cross sectional study conducted at Ghazi Al-Hariri Surgical specialized hospital during the period from the firsts of January 2018 to the end of Mar 2019, in which 118 diabetic patients (71 female and 47 male) with lower urinary tract symptoms were enrolled in the current study. The mean age (62±13) years old, 37.3% of patients presented with urgency as the main type of dysfunction. Diabetic cystopathy were found in (40,4%) of the male and (43.7%) of the female, while detrusor over activity were found in (15.5%) of the male and (18.3%) of the female, bladder outlet obstruction were represent (8.5%) of the male with significant association. Highly significant (<0.001) increase in female compliance and flow rate than that in male but highly significant decrease were found in female filling IV pressure. We concluded that Bladder over activity of the patients in the current study was found in more than half of the patients and diabetic cystopathy is the most common urodynamic finding in diabetic bladder dysfunction in patients with DM.
Al-Naymi, N.A.Sh., H.A.S. AL-Nuaimi and M.R. Nashaat. 2022. Toxicity Stress of the Durah Power Plant Ash and its Effect on the Alga Chlorococcum humicola (Naeg) Rabenhorst 1868. Arab Journal of Plant Protection, 40(2): 188-192. https://doi.org/10.22268/AJPP-040.2.188192 This study illustrates the acute toxic effect of ash released from Durah power plant (DPP) on the biology of the phytoplankton species Chlorococcum humicola in Iraq. The results showed that the median lethal concentration for killing 50% of the Alga population (LC50) was 0.15 and 0.13 ppt (parts per thousand) for 24 and 48 hours exposure to crude ash concentrations, respectively. In contrast, no LC50 value was recorded for 72 and 96 hrs after exposure. The reduction
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
In the present study, the effect of new cross-section fin geometries on overall thermal/fluid performance had been investigated. The cross-section included the base original geometry of (triangular, square, circular, and elliptical pin fins) by adding exterior extra fins along the sides of the origin fins. The present extra fins include rectangular extra fin of 2 mm (height) and 4 mm (width) and triangular extra fin of 2 mm (base) 4 mm (height). The use of entropy generation minimization method (EGM) allows the combined effect of thermal resistance and pressure drop to be assessed through the simultaneous interaction with the heat sink. A general dimensionless expression for the entropy generation rate is obtained by con
... Show MoreThis research explores the concept of cruel optimism in the context of challenging patriarchal, cultural, and social traditions in Ayad Akhtar’s The Who and the What. Cruel optimism, a term coined by Lauren Berlant, refers to the paradoxical attachment to positive aspirations that may ultimately obstruct personal fulfillment and well-being. This study examines how individuals who resist patriarchal norms and entrenched cultural traditions often face significant emotional, psychological, and social challenges. Through a multidisciplinary approach, including literary analysis, sociological perspectives, and psychological insights, the research delves into the lived experiences of those who strive for autonomy, equality, and self-realization
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More