Pyometra is an uncommon gynecological condition resulted from occlusion of the cervix usually by a malignant condition. It has an incidence of 0.1%-0.5%. Untreated pyometra leads to rupture uterus and acute infective peritonitis presented as acute abdomen and needs urgent surgical intervention. Pyometra resulted from occlusion of the vagina is very rare. No cases have been described in the English literature to the best of our knowledge and in the PubMed. The purpose of reporting this case is to show that occlusion of the vagina could occur in postmenopausal women as a consequence of local infection and results in pyometra and also to show that pyometra can be presented in a different way apart from the classical presentation. The way to reach the diagnosis and how to manage the case has been also discussed thoroughly.
The research started from the basic objective of tracking the reality of organizational excellence in educational organizations on the basis of practical application. The research in its methodology was based on the examination of organizational excellence in the way of evaluating institutional performance. Tikrit University was selected as a case study to study the reality of application to the dimensions of organizational excellence in it, The results of the analysis for ten periods during the year and month. For the accuracy of the test and its averages, it was preferable to use the T test to determine the significance of the results compared to the basic criteria.
The research found that there is an o
... Show MoreBackground: Pain after amputation is a common squeal, patients often have a phantom limb sensation too, which can be painful or painless.
Objectives: This study describes the sensations and pain reported by patients after traumatic amputation of unilateral lower limb as well as the incidence and epidemiology of those sensations.
Patients and methods: A retrospective study of 118 patients who underwent lower limb amputation due to trauma. Patients scheduled for interview by means of a standard questionnaire and examined, days, weeks, months, years, after surgery about limb pain, phantom limb sensations, stump pain, back and shoulder pain .
Results: Statistical analysis revealed that the incidence of non-painful sensation was the
The current study was conducted to study some certain quantities of dates , apple and white vinegar. It was noticed that the percentage of acetic acid was (3.6%, 4.5%, 2.7%), for each and respectively, it was found that vinegar has an inhibiter biological activity against bacteria isolated from rectal fistula inflammation cases. It was also noticed that vinger types have ability to increase healing anus fistula and show no toxicity on laboratory mice.
Background:Periodontal diseases are infectious diseases in which periodontalpathogens trigger chronic inflammatory and immune responses. Interleukine-6 is a multifunctional cytokine playing a central role in inflammation and tissue injury.The aim of the study IS to determine the level of Interleukin-6(IL-6) in saliva of patients with chronic periodontitis compared to healthy subjects. Materials and Methods:The total subjects of the present study is 60, divided into 3 groups; 20 patients with chronic periodontitis with pocket depth(PD ≥4 mm)(group I), 20 patients with pocket depth(PD <4 mm) with clinical attachment loss (group II), and 20 healthy controls with pocket probing depth (PPD ≤ 3 mm) without clinical attachment loss (g
... Show MoreThis research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.
Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreThe use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.