Background: Neonatal seizures are the most common neurological emergency in newborns, often associated with significant mortality and long-term neurodevelopmental disabilities. The aim is to determine the incidence, etiological causes, and risk factors associated with neonatal seizures.Patients and Methods: This prospective case-control study was conducted over eight months, from January 1 to August 31, 2022, the study was conducted at the neonatal care unit of Children Welfare Teaching Hospital. Neonates who developed clinically recognizable seizures before 28 days of life in term infants, or up to 44 weeks corrected gestational age in preterm infants, were included. Data collection involved demographic information, prenatal, perinatal, and postnatal history, family history, seizure characteristics, physical examination including growth parameters, and relevant laboratory and radiological investigations. Follow-up was conducted two months later via phone interviews.Results: Among 180 neonates included, 50% had seizures while the remaining served as controls. The incidence of seizures among admitted neonates was 7.7%. The three main etiologies were birth asphyxia, infection, and metabolic disorders, each accounting for 25.6% of cases. The mean age at seizure onset was 9.3 ± 9.1 days, with a median of 5 days. Males were more affected (male-to-female ratio 1.57:1), and seizures were more common in term infants. Significant associations were found with family history of neurological disease and neonatal death. Vaginal delivery was more linked to birth asphyxia, while cesarean delivery was associated with neurological malformations. Mortality was three times higher in neonates with seizures.Conclusion: Birth asphyxia, infection, and metabolic disorders are leading causes of neonatal seizures. A positive family history and prematurity increase susceptibility. Early onset may indicate etiology, but seizure type does not predict cause. Seizure presence significantly increases neonatal mortality.
Idioms are a very important part of the English language: you are told that if you want to go far (succeed) you should pull your socks up (make a serious effort to improve your behaviour, the quality of your work, etc.) and use your grey matter (brain).1 Learning and translating idioms have always been very difficult for foreign language learners. The present paper explores some of the reasons why English idiomatic expressions are difficult to learn and translate. It is not the aim of this paper to attempt a comprehensive survey of the vast amount of material that has appeared on idioms in Adams and Kuder (1984), Alexander (1984), Dixon (1983), Kirkpatrick (2001), Langlotz (2006), McCarthy and O'Dell (2002), and Wray (2002), among others
... Show MoreColonialism invades the Third World countries, physically and psychologically. This article exposes but sample of the physical and psychological consequences of colonialism. The Beekeeper of Aleppo (2019) by the British novelist, Christy Lefteri is a typical novel to diagnose the harsh circumstances of individuals within and after the disaster. Since it depicts characters from Asian countries, it would be a best representative for all Asian people who suffer colonialism. Migration toward anonymity is the mere option for the colonized people. Aftermath, they experience displacement, trauma, and the loss of identity.
The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreThe idea of a homomorphism of a cubic set of a KU-semigroup is studied and the concept of the product between two cubic sets is defined. And then, a new cubic bipolar fuzzy set in this structure is discussed, and some important results are achieved. Also, the product of cubic subsets is discussed and some theorems are proved.
In this paper, the finite element method is used to study the dynamic behavior of the damaged rotating composite blade. Three dimensional, finite element programs were developed using a nine node laminated shell as a discretization element for the blade structure (the same element type is used for damaged and non-damaged structure). In this analysis the initial stress effect (geometric stiffness) and other rotational effects except the carioles acceleration effect are included. The investigation covers the effect speed of rotation, aspect ratio, skew angle, pre-twist angle, radius to length, layer lamination and fiber orientation of composite blade. After modeling a non-damaged rotating composite blade, the work procedure was to ap
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).