Pyometra is an uncommon gynecological condition resulted from occlusion of the cervix usually by a malignant condition. It has an incidence of 0.1%-0.5%. Untreated pyometra leads to rupture uterus and acute infective peritonitis presented as acute abdomen and needs urgent surgical intervention. Pyometra resulted from occlusion of the vagina is very rare. No cases have been described in the English literature to the best of our knowledge and in the PubMed. The purpose of reporting this case is to show that occlusion of the vagina could occur in postmenopausal women as a consequence of local infection and results in pyometra and also to show that pyometra can be presented in a different way apart from the classical presentation. The way to reach the diagnosis and how to manage the case has been also discussed thoroughly.
This review explores the Knowledge Discovery Database (KDD) approach, which supports the bioinformatics domain to progress efficiently, and illustrate their relationship with data mining. Thus, it is important to extract advantages of Data Mining (DM) strategy management such as effectively stressing its role in cost control, which is the principle of competitive intelligence, and the role of it in information management. As well as, its ability to discover hidden knowledge. However, there are many challenges such as inaccurate, hand-written data, and analyzing a large amount of variant information for extracting useful knowledge by using DM strategies. These strategies are successfully applied in several applications as data wa
... Show MoreBiped robots have gained much attention for decades. A variety of researches have been conducted to make them able to assist or even substitute for humans in performing special tasks. In addition, studying biped robots is important in order to understand human locomotion and to develop and improve control strategies for prosthetic and orthotic limbs. This paper discusses the main challenges encountered in the design of biped robots, such as modeling, stability and their walking patterns. The subject is difficult to deal with because the biped mechanism intervenes with mechanics, control, electronics and artificial intelligence. In this paper, we collect and introduce a systematic discussion of modelin
Background: Sex variations in coronary artery disease (CAD) are well documented. However, sex differences in coronary artery calcium (CAC) and its role in the detection of coronary artery stenosis remain controversial. Objective: To assess the impact of sex variation on coronary artery calcification and its efficacy in predicting coronary artery stenosis. Methods: This is a cross-sectional observational study including 230 consecutive patients with suspected CAD (120 men and 110 women) referred for coronary computed tomography angiography (CCTA). The study analyzed sex-based differences in the sensitivity and specificity of coronary artery calcification (CAC) for detecting moderate to severe stenosis across various coronary arteries
... Show MoreCase Report.
To present a case of a previous complicated mandibular orthognathic surgery that aimed to setback the mandible in a female cleft lip and palate (CLP) patient, which led to bone necrosis on one side with subsequent severe mandibular deviation and facial asymmetry. We additionally reviewed the previous reports of similar complications, the pathophysiology and the factors that could lead to this dreadful result.
A 27-year-old female patient presented with a severe dentofacial deformity secondary to a complicated bilateral sagittal spli
Background: In Iraq, adolescents confront challenges, external and internal factors and their life circumstances are exacerbated by threats to their physical and mental health.
Objective: To throw a light on training for life skills which in turn leads to promotion of adolescents physical and mental health.
Methods: A total of 120 adolescents participated in the study (50 of them were trained for life skills and the others act as control group) for the period April 2010 to Sept. 2011. Their age was 19 ± 2.4 years with male to female ratio of 1.4:1. The program consisted of several subjects concern with physical and mental health. Positive outcomes were determined. Scores
... Show MoreThis study aimed at highlighting the role of small and medium enterprises in bringing about economic development in Jordan. The study examined the impact of the number, size of investment and the number of jobs provided by these enterprises on the rate of growth in gross domestic product (GDP) as an indicator for economic development. To achieve its objectives, the study adopted descriptive and quantitative analysis. A linear multi regression model was developed with a growth rate of GDP as dependent variable and the number of institutions, size of investment, and the number of job opportunities as independent variables. The study concluded that each increase by one small or medium enterprise lead to an increase in the rate of gr
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit
... Show MoreHumans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th
... Show MoreMulti-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the chara
... Show More