Background: Ultrasound is a valuable tool for evaluating fetal problems throughout pregnancy. Amniotic fluid anomalies have been associated with unfavorable maternal, fetal, and obstetrical outcomes. Objective: To determine the effect of echogenic amniotic fluid during term pregnancy on the presence of meconium stain liquor and pregnancy outcome. Methods: A cross-sectional study was conducted on 1080 term pregnant women who visited Al-Elwiya Maternity Teaching Hospital from May 1st, 2021, to May 1st, 2023. Ultrasound was used to analyze echogenic amniotic fluid and turbid liquor. The liquor state was tested either after an artificial membrane rupture in the vaginal delivery trial or during a cesarean section. Results: Echogenic amniotic fluid or turbid liquor was detected in 120 cases, while clear liquor was found in 960. Meconium-stained amniotic fluid was discovered in 39 of the 120 instances with turbid liquor, whereas bloody liquor was found in four. In contrast, clear fluid with vernix caseosa was identified in 55 cases, while just 22 cases had clear liquor. Clear liquor was found in 640 of the 960 cases, vernix caseosa liquor in 200, and meconium-staining liquor in only 120 cases. Conclusions: The presence of echogenic amniotic fluid or turbid liquor increases the chance of meconium-stained liquor, but it could also be caused by vernix caseosa. Other indicators, such as fetal movement and the non-stress test, should be used to determine the manner of delivery.
The importance of research is to be considered by highlighting the tax policy in Iraq which extended for successive measurement of the amount of tax receipts for respective periods, the research problem represents security, economic and political issues that Iraq suffered which were very difficult since Nineties of the last century until now that led to a lake of clarity in tax policy trends, volatility in it and finally reflected on the tax revenues increase or decrease. One of the main recommendations of the research is: (The necessity to develop a deliberate strategy for tax policy in Iraq which should take into account financial, economic, and social goals in appropriate way).
Background: Ultrasound provides a powerful tool for assessing early pregnancy and detecting pregnancy failure at first trimester and promoting rapid effective management. Several criteria have been established to predict the pregnancy outcome particularly in symptomatic women .
Aim: To evaluate asymptomatic women at the first trimester of pregnancy , to assess the efficacy of certain ratios as mid sac diameter (MSD) / yolk sac ratio & crown rump length (CRL)/mid sac diameter (as indicator of early first trimester oligohydramnios) in predicting poor 1st trimester outcome
Type of the study: A cross-s
... Show MoreThe Role of Japan in the Reconstruction of Iraq
The region is defined by the spatial dimension, which consists of a set of stabilizers (towns and villages). The concept of the territory requires conditions on the nature of functional relations and the mutual influence of the regions within the region. Any territory must be based on the interdependence and interaction between the mother city and its surrounding countryside and cities, and when the interdependence is strong and the interaction is clear, it helps to define the territory. The regions are divided on different bases. There are geographically or national homogeneous regions, and there are cultural regions that want to preserve their culture in terms of language or religion. There are administrative regions to manage
... Show MoreHeart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix
... Show MoreBackground: Osteoporosis is denoted by low bone mass and microarchitectural breakdown of bone tissue, directing to increased fracture risk and bone fragility. Fractures may lead to a decreased quality of life and increased medical costs. Thus, osteoporosis is widely considered a significant health concern.
Objective. This study aimed to compare quantitative computed tomography (QCT) and dual-energy X-Ray absorptiometry (DXA) to detect osteoporosis in postmenopausal women.
Subjects and Methods. We measured spinal volumetric bone mineral density (BMD) with QCT and areal spinal and hip BMD with DXA in 164 postmenopausal women. We calculated the osteo
... Show MoreHerpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicati
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More