The surgical treatment of inferior turbinate hypertrophy (ITH) is challenging. Submucosal diathermy (SMD) is a well-known surgical procedure used for the treatment of ITH, microdebrider-assisted rhinoplasty (MAT) is relatively a newer technique used in the management of ITH. To evaluate the effect of MAT on inferior turbinate size and nasal airway patency in patients with bilateral ITH in comparison to SMD. Seventy-one patients presented with nasal obstruction due to bilateral ITH were allocated into two groups, group a (35 patients) were subjected to SMD and 36 patients in group B were subjected to MAT. All the patients had been sent to CT scan pre-operatively and at the third postoperative month to measure the cross-sectional areas of the inferior turbinate, also the subjective assessment of nasal airway patency was done by visual analog scale (VAS) preoperatively and at the end of 3ed post-operative month. The mean cross-sectional area of IT decreased from 163 mm2 pre- operatively to 149.67 mm2 at the 3ed post-operative month in group A (P-value =0.02), and from 163.67 mm2 to 131mm2 in group B (P value= 0.004). Intergroup comparison had shown that there was a significant difference between MAT and SMD in decreasing the size of IT and relieving nasal obstruction at the 3ed postoperative month (p-value = 0.026 and 0.021 respectively). In conclusion, both MAT and SMD are effectively decreasing the size of the inferior turbinate and relieving nasal obstruction but with superior results in MAT.
The study seeks to investigate the effect of Dunn Dunn learning style model on students’ achievement. Besides, the way of developing students’ deductive thinking by testing the null hypothesis: there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05). Additionally, there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05) on testing developing deductive thinking skills. The researcher adopted a quasi-experimental posttest
... Show MoreObjective: To study the protective eff ects of cinnamic acid on dextran sodium sulfate (DSS) induced ulcerative colitis (UC) in mice. Materials and methods. Forty adult male mice were randomLy divided into fi ve groups, control group, an induction group received 3% DSS in drinking water for 7 consecutive days. Two treatment groups received oral suspension of cinnamic acid 50 and 25 mg/kg, respectively and 3% DSS in drinking water, for 7 consecutive days. The fi nal group received oral suspension of cinnamic acid 50 mg/kg for the latter 7 days without DSS in drinking water. All the animals were euthanized on day eight. The colon of animals was extracted and divided into two sections, the middle was homogenized and biochemically analy
... Show MoreThe Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin
... Show MoreThis study produces an image of theoretical and experimental case of high loading stumbling condition for hip prosthesis. Model had been studied namely Charnley. This model was modeled with finite element method by using ANSYS software, the effect of changing the design parameters (head diameter, neck length, neck ratio, stem length) on Charnley design, for stumbling case as impact load where the load reach to (8.7* body weight) for impact duration of 0.005sec.An experimental rig had been constructed to test the hip model, this rig consist of a wood box with a smooth sliding shaft where a load of 1 pound is dropped from three heights.
The strain produced by this impact is measured by using rosette strain gauge connected to Wheatstone
Mishrif Formation is the main reservoir in Amara Oil Field. It is divided into three units (MA, TZ1, and MB12). Geological model is important to build reservoir model that was built by Petrel -2009. FZI method was used to determine relationship between porosity and permeability for core data and permeability values for the uncored interval for Mishrif formation. A reservoir simulation model was adopted in this study using Eclipse 100. In this model, production history matching executed by production data for (AM1, AM4) wells since 2001 to 2015. Four different prediction cases have been suggested in the future performance of Mishrif reservoir for ten years extending from June 2015 to June 2025. The comparison has been mad
... Show MoreCooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More