AIM: To determine the value of the combination of thin-section 3 mm coronal and standard axial DWI and their impact in facilitating the diagnosis of acute brainstem infarction. METHODS: A cross-sectional study conducted from the 1st of April 2017 to the end of February 2018 on 100 consecutive patients (66% were male, and 34% were female) with isolated acute ischemic infarction in the brainstem. The abnormal MRI findings concerning the ischemic lesions were interpreted on standard axial 5 mm and thin-section coronal 3mm DWI. RESULTS: The mean age of the studied group was 69.2 ± 4.3 for male and 72.3 ± 2.5 years. The standard axial DWI can diagnose 20%, 6.7% and 6.7% of the infarctions in midbrain, pons and medulla oblongata respectively, while both axial and thin coronal sections together can diagnose 80% of midbrain infarctions, 93.3% of pons infarctions and 93.3% of medulla oblongata infarctions. Furthermore, the thin section coronal 3 mm section can diagnose very smaller ischemic lesion volume in comparison to the standard axial 5mm section (3.4 ± 0.45 / cm3 versus 4.6 ± 0.23 / cm3, P < 0.001) CONCLUSION: The addition of thin-section coronal DWI can facilitate the detection of brainstem ischemic lesions. We suggest its inclusion in the stroke MRI protocol.
The most important topic for psychologist generally is factor of education and it's active tools because learning needs active perception for stimulus that recived by the educator and give it avalue and meaning , Need for cognition is
very important in the various daily fields of life , especially in learning and teaching and the academy work , it help with shifting the learning level for people , and icreas the intense and challenge between them
The research endeavored to achieve the following aim :
1- Measuring the level of peripheral perception for the university student .
2- Measuring the level of need for cognition for the university student .
3- Measuring the level of peripheral perception for the university student
The availability of low- cost adsorbent namely Al-Khriet ( a substance found in the legs of Typha Domingensis) as an agricultural waste material, for the removal of lead and cadmium from aqueous solution was investigated. In the batch tests experimental parameters were studied, including adsorbent dosage between (0.2-1) g, initial metal ions concentration between (50-200) ppm (single and binary) and contact time (1/2-6) h. The removal percentage of each ion onto Al-Khriet reached equilibrium in about 4 hours. The highest adsorption capacity was for lead (96%) while for cadmium it was (90%) with 50 ppm ions concentration, 1 g dosage of adsorbent and pH 5.5. Adsorption capacity in the binary mixture were reduce at about 8% for lead a
... Show MoreAnalysis the economic and financial phenomena and other requires to build the appropriate model, which represents the causal relations between factors. The operation building of the model depends on Imaging conditions and factors surrounding an in mathematical formula and the Researchers target to build that formula appropriately. Classical linear regression models are an important statistical tool, but used in a limited way, where is assumed that the relationship between the variables illustrations and response variables identifiable. To expand the representation of relationships between variables that represent the phenomenon under discussion we used Varying Coefficient Models
... Show MoreLet be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space
A complexified adjoint representations of the complexification Lie algebras associated with the special orthogonal group SO(3) and special linear group SL(2,₵) have been obtained. A new representation of their tensor product is naturally arisen and computed in details.
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreOffline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters. In this paper a proposed method for Offline Arabic handwritten recognition. The proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and support vector machines (SVMs) to enhance the recognition accuracy. The proposed method experimented using (AHDB) database. The experiment result show (99.08) recognition rate.
A proposed feature extraction algorithm for handwriting Arabic words. The proposed method uses a 4 levels discrete wavelet transform (DWT) on binary image. sliding window on wavelet space and computes the stander derivation for each window. The extracted features were classified with multiple Support Vector Machine (SVM) classifiers. The proposed method simulated with a proposed data set from different writers. The experimental results of the simulation show 94.44% recognition rate.
Objective: We hypothesized that attacking cancer cells by combining various modes of action can hinder them from taking the chance to evolve resistance to treatment. Incorporation of photodynamic therapy (PDT) with oncolytic virotherapy might be a promising dual approach to cancer treatment. Methods: NDV AMHA1 strain as virotherapy in integration with aminolaevulinic acid (ALA) using low power He-Ne laser as PDT in the existing work was examined against breast cancer cells derived from Iraqi cancer patients named (AMJ13). This combination was evaluated using Chou–Talalay analysis. Results: The results showed an increased killing rate when using both 0.01 and 0.1 Multiplicity of infection (MOI) of the virus when combined with a dose of 617
... Show MoreThis article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.