Background: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , visible or palpabable skull mass is noted ) that revealed either calvarial or skull base metastases were included in this study.Results: During the period of the study 175 patients were included according the inclusion criteria. Primary sites were breast cancer (54.85%), lung cancer (14.28%), prostate cancer (6.28%), malignant lymphoma (5.14%), and others (19.42%). The mean time from primary diagnosis to skull metastasis diagnosis was 71 months for cases of breast cancer, 26 months for prostate cancer, 9 months for lung cancer, and 4 months for malignant lymphoma. Calvarial circumscribed intraosseous metastases were found most frequently (25.7%). The patients were mainly asymptomatic. However, some patients suffered from local pain or cranial nerve palsies that harmed their quality of life. Treatment, mainly for symptomatic cases, was by local or whole-skull irradiation.Conclusion: Secondary skull tumors are not rare, and most are calvarial circumscribed intraosseous tumors. MRI contribute to understanding their type, location, and multiplicity, and their relationship to the brain, cranial nerves, and dural sinuses. Radiation therapy improved the quality of life (QOL) of patients with neurological symptoms.
Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections. Schema and text world theories are useful tools in cognitive stylistic studies. The reader's perception o
... Show Moreplanning is among the most significant in the field of robotics research. As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the
... Show More
One and two-dimensional hydraulic models simulations are important to specify the hydraulic characteristics of unsteady flow in Al-Gharraf River in order to define the locations that facing problems and suggesting the necessary treatments. The reach in the present study is 58200m long and lies between Kut and Hai Cities. Both numerical models were simulated using HEC-RAS software, 5.0.4, with flow rates ranging from 100 to 350 m3/s. Multi-scenarios of gates openings of Hai Regulator were applied. While the openings of Al-Gharraf Head Regulator were ranged between 60cm to fully opened. The suitable manning roughness for the unsteady state was
... Show MoreRecent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show MoreBackground: Hypothyroidism is the most prevalent thyroid disorders worldwide. Hypothyroidism manifestations are wide spectrum, affecting various systems in human body including the nervous system. Hypothyroidism can cause neuropsychiatric symptoms such as anxiety, depression and diminishing in attention, memory and executive function. Aim: to investigate the level of anxiety and depression in patients with hypothyroidism receiving levothyroxine treatment. Method: a cross-sectional study was conducted at Baghdad Center for Nuclear Medicine and Radiation Therapy from March to June 2022. The study population included patients of both genders, aged 18-65 years, diagnosed with hypothyroidism, were receiving levothyroxine treatment and
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More