ABSTRACT Background: Tuberculosis is a worldwide infectious disease in spite of advancement in health care system. Tuberculous lymphadenitis is the most prevalent form of extra pulmonary tuberculosis with predilection of cervical lymph nodes. Objectives: To evaluate the reliability of grey scale ultrasonography together with color Doppler in the diagnosis of cervical tuberculous lymph adenitis and evaluation of early therapeutic response. Subjects and methods:From July 2015 to May 2016 in Al-Karama teaching hospital /Kut city- Wasit-Iraq, 25 patients (14 males and 11 females) with ages range from (6-50) years. Ultrasonography examination was done for all patients and grey scale criteria (distribution, size, shape, echogenicity, echogenic hilum, intranodal necrosis and ancillary features) and vascular distribution were recorded to help in tuberculous lymphadenitis diagnosis. Excisional biopsy was done to confirm the diagnosis histopathologically. After chemotherapy the Patients were followed up after 46 days of treatment, again the grey scale criteria were recorded and compared with the 1st reading. Results: Ultrasonography could identify 88% of the patients (22/25) as having cervical tuberculous lymphadenitis while histopathology proved that only 80% of patients really have the disease. This mean that ultrasonography had good sensitivity (100%), specificity (60%) and accuracy (90%) with no false negative and 8% false positive.In following up the patients, grey scale ultrasonography criteria showed a significant difference for the same patients before and after 46 days of treatment. Conclusions: Ultrasonography was found to play a paramount role in detection, localization and delineation of cervical tuberculous lymph nodes hence grey scale and color Doppler are reliable in diagnosis of the disease and the evaluation of therapeutic response of the patients.
The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s
... Show MoreThe rate of births delivered by cesarean section (CS) has gone up substantially all over the world. Post-cesarean surgical site infection (SSI) is a common cause of maternal morbidity and mortality that results in prolonged period of hospitalization with increased cost and direct health implications, especially in low socioeconomic population, resource- restricted settings, and war- related conditions with internal forced movement. This study was aimed to find incidence of post cesarean section surgical site infection withthe accompanying risk factors.Pregnant ladies admitted to department of obstetrics and gynecology at Medical City Hospital in Baghdad who had undergone CSs were followed up prospectively from first of January 2017 till end
... Show More
In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di
... Show MoreThis study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that functions as an act over S if and only if functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following, is acting over S if and only if is a module where T is a nilpotent operator, is a
... Show MoreAfter receipt of military commanders power in 1980, they were determined to solve the
Kurdish question by force, just like their predecessors in resolving such issues, and the
situation became worse when the Kurdish resistance in a more organized than previous years
and behind the Party (PKK) .
After the mass support of the Kurdish widespread party get involved most of the Kurdish
youth in the party organization of the (PKK), prompting Turkish President then to make
decisions and take immediate action firm against the party, but the Kurdish issue began
Tthlhal when he arrived at the helm of President Turgut Ozal in 1989, he worked on the
development of the areas inhabited by the Kurds, specifically the Southeast A
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreBackground: Non-alcoholic fatty liver disease (NAFLD) is the most common liver disorder globally. The prevalence is 25% worldwide, distributed widely in different populations and regions. The highest rates are reported for the Middle East (32%). Due to modern lifestyles and diet, there has been a persistent increase in the number of NAFLD patients. This increase occurred at the same time where there were also increases in the number of people considered being obese all over the world. By analyzing fatty liver risk factors, studies found that body mass index, one of the most classical epidemiological indexes assessing obesity, was associated with the risk of fatty liver. Objectives: To assess age, sex, and body mass index (BMI) as
... Show More