Objective: To study the effect of epidural spinal injection over one year in case of spinal stenosis. Methodology: This prospective study included 566 patients with spinal stenosis seen at Al-Kindy Teaching and Al-Sader, Hospitals who were treated by local epidural steroid injection. They were followed up for at least five subsequent visits after seven days, one month, three months, six months, and one year to assess efficacy. Result: Mean age of patients was 49.5 years, with a predominance of females (65%). L4/L5 was the most involved level in the spinal stenosis (70%). Grade II stenosis accounted for (45.4%) of cases. The pairwise comparison revealed that there was significant decrease in proportions of patients with pain in day
... Show MoreAn integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreObjective (s): To determine proportion of anemia among sample of Pregnant women. To identify factors
associated with the anemia (Maternal age, maternal education, gestational age, parity, gravidity, birth
interval, smoking, taking iron supplements and dietary habits).
Methodology: A cross-sectional study conducted at Al- washash & Bab-almoadham primary health care
centers. The sample was selected by (non-probability convenient sampling) and sample size was (550).
The study started from 1st March 2011 to 30th of March 2012. The data was collected by direct interview
using special questionnaire to obtained socio-demographic information.
Results: the result shows that mean age of the subjects was 26.5± 7.5 years, 8
Background. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreKE Sharquie, KI Al-Hamdi, AA Noaimi, AA Al-Mohammadi, J Clin Exp Invest www. clinexpinvest. org Vol, 2011 - Cited by 1
It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.