Background: Cystoid Macular Edema (CME) in its various forms can be considered one of the leading causes of central vision loss in the developed world. It is not a disease itself, It represents a common pathologic sequel of the retina and occurs in a variety of pathological conditions such as, diabetic retinopathy, central or branch retinal vein occlusion(CRVO,BRVO), intraocular inflammation and following cataract extraction. Objective: This study was done to investigate the pattern of CME in patient attending Erbil Teaching Hospitals.Type of the study: Cross- sectional study.Methods and Materials: This is a hospital base cross- sectional study that included 61 patients (75 eyes) conducted at Erbil Teaching Hospitals for six months. All patients underwent a comprehensive assessment including medical and ophthalmic history, detailed ophthalmic examination and Optical Coherence Tomography (OCT) examination.Results: of the 61 patients 32 (52.5%) were females and 29 (47.5%) were males. The mean age was (56.4±10.8) years. Out of the 75 eyes included in the study, 41 eyes (54.66%) had diabetic retinopathy, 10 eyes (13.34%) had CME following cataract operation (Irvine-Gass syndrome), 8 eyes (10.67%) had BRVO, 6 eyes (8%) were had CRVO, 5 eyes (6.66%) had age related macular degeneration, 3 eyes (4%) with uveitis, and 2eyes (2.67%) had Retinitis Pigmentosa. The average macular thickness was (415.6± 107).Conclusions: Diabetic retinopathy is the most common predictive factor of CME, followed by cataract surgery. CME is more severe in diabetic retinopathy, CRVO and after cataract surgery.
يحتل موضوع الاستهلاك اهمية كبيرة في الدراسات الاقتصادية في حالتي السلم والحرب وذلك لارتباط هذا الموضوع بالانسان والمجتمع ولكونه احد مؤشرات مستوى الرفاهية الاقتصادية والاجتماعية وتزداد اهمية ضبط حركة هذا المتغير السلوكي والكمي في زمن الحرب اكثر مما هو عليه في حالة السلم، في هذا البحث تم استخدام بيانات احصائية عن الانفاق الاستهلاكي الخاص ونصيب الفرد من الدخل القومي اضافة الى الرقم القياسي لاسعار المس
... Show MoreDigital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThe present study aims at finding out the (effect of the Caroll’s pattern on the second intermediate class pupils' achievement in geography)
The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (74) female pupils. The sample is divided into two groups (38) experimental group and (36) control one. The sample is selected from first intermediate class pupils ( Am Salama Secondary School for girls) \ Baghdad\ Al-karkh-1, for academic year 2015-2016.
The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scor
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More