BACKGROUND: Preterm labour is a major cause of perinatal morbidity and mortality, so it is important to predict preterm delivery using the clinical examination of the cervix and uterine contraction frequency. New markers for the prediction of preterm birth have been developed such as transvaginal ultrasound measurement of cervical length as this method is widely available. OBJECTIVE: To determine, whether transvaginal cervical length measurement predicts imminent preterm delivery better than digital cervical length measurement in women presented with preterm labour and intact membranes. PATIENTS AND METHODS: Two hundred women presented with preterm labour between 24 and 36+6 weeks of gestation were included in this study. All women subjected for digital and transvaginal ultrasound cervical length measurement and the outcome measures were occurrence of preterm delivery within 48 hours and within 7 days. RESULTS: Assessment of cervical length measurement using transvaginal ultrasound for the 200 women presented with preterm labour with intact membrane revealed that 8 (4%) delivered within 48 hours and 16 (8%) delivered within 7 days. According to the Bishop score, the test was positive if the Bishop score was ≥8, or 4-7 with cervical length ≤30 mm. The cut-off value for transvaginal ultrasound cervical length considered as 30 mm in the study group. CONCLUSION: Transvaginal sonographic measurement of cervical length can predict imminent preterm delivery in women presented with preterm uterine contractions and Bishop score between 4 - 7 compared with digital cervical length measurement.
Semi-parametric models analysis is one of the most interesting subjects in recent studies due to give an efficient model estimation. The problem when the response variable has one of two values either 0 ( no response) or one – with response which is called the logistic regression model.
We compare two methods Bayesian and . Then the results were compared using MSe criteria.
A simulation had been used to study the empirical behavior for the Logistic model , with different sample sizes and variances. The results using represent that the Bayesian method is better than the at small samples sizes.
... Show MoreIn this research, Artificial Neural Networks (ANNs) technique was applied in an attempt to predict the water levels and some of the water quality parameters at Tigris River in Wasit Government for five different sites. These predictions are useful in the planning, management, evaluation of the water resources in the area. Spatial data along a river system or area at different locations in a catchment area usually have missing measurements, hence an accurate prediction. model to fill these missing values is essential.
The selected sites for water quality data prediction were Sewera, Numania , Kut u/s, Kut d/s, Garaf observation sites. In these five sites models were built for prediction of the water level and water quality parameters.
This research aims to removes dyes from waste water by adsorption using banana peels. The conduct experiment done by banana powder and banana gel to compare between them and find out which one is the most efficient in adsorption. Studying the effects different factors on adsorption material and calculate the best removal efficiency to get rid of the methylene blue dye (MB).
Background: Diabetes mellitus is one of the commonest chronic disorders worldwide with a rapid rise in prevalence. In Iraq its prevalence is high especially in elderly age group. Patients with type 2 diabetes mellitus have higher vulnerability for complications, whether microvascular or macrovascular. Ocular complications are common in diabetes mellitus, and comprise diabetic retinopathy, diabetic papillopathy, cataract, glaucoma, dry eye disease and diabetic keratopathy. Diabetic keratopathy involves endothelial and epithelial tissues of the cornea, leading to persistent epithelial defect, corneal erosion, or corneal ulcers.
Aim of the Study: To compare the mean corneal endothelial cell count between patients wi
... Show MoreThe history of civilizations in the past centuries is a rich source for creativity and inspiration in all areas of art and design, especially in the field of fashion design. Many designers draw their designs from previous eras; which is the aim of this research as we propose designing fashion the mannequin for the category of young girls aged between (10-18). The costumes were inspired by Victorian women's costumes during the time period (1860-1890) and were subdivided into three time periods (1860-1870), (1870-1880), (1880-1890) forming three designs for each time period , analyzing the nine designs to achieve the creative , functional and aesthetic aspects that are appropriate for the age group (research sample). The importance of the
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More