Background: The disc prolapse is a common condition especially in young adults. Different levels are affected in the lumber region; the L4/L5 disc is more susceptible to longitudinal load and is the most common site of lumbar disc prolapse. The L5/S1 disc is protected from torsion load by strong ilio-lumbar ligaments but it is more susceptible to axial compressive forces. Many factors affect the result and outcome of surgery in these levels.Objective: The aim of this study is to correlate operative data, short-term results, complications, and prognostic factors (age, gender, mobility, hospital stay, and level of pain) for one-level lumber discectomybetween different levels (L4–L5 vs. L5–S1).Methods In this prospective study, 32 patientsin Al-Yarmouk teaching hospital undergoing survey form March 2008-December 2012.Six patients were excluded from this study because they were diabetics and multilevel disc degeneration .Fifteen (57.6%) patients undergoL5-S1 discectomy and 11 (42.4%) patients undergoL4-5 discectomy. Questionnaires for leg and back pain intensity (Visual Analogue Scale ;VAS), duration of leg pain, and disability (Oswestry Disability Index; ODI), were obtained preoperatively, 3 months, 6 months, 1-year- and 2 year follow-up.Analyses were utilized to evaluate the relationship between surgical outcomes and variable (gender, age, lumber segment, pre-operative ODI, and pre-operative VAS).Results: Mean operative time was[73.44 ± 26.25] min, mean hospital stay was [3-7] days, and mean mobilitywas [2.55 ± 0.93] days. At 2-year follow up, patients revealed a statistical significant improvement inVAS pain (P < 0.05), and ODI lumbar function (P < 0.05).The complications rate were 20.3 %.Our study elaborates good results for one-segmental L5-S1overL4-L5 discectomy. Discectomy of the L4–L5 disc wasassociated with an increased risk of complication (P < 0.05). The comparison revealed that operative time was influenced by age (P = 0.034); hospital stay was influenced by level (P = 0.036) and pre-op VAS (P = 0.006); while complications were influenced by level (P = 0.001) and pre-op ODI (P = 0.049Conclusion: The study revealed significant results for L5-S1 discectomy over L4-L5 discectomy in the late follow up period; the complications rate were higher in L4-L5 level discectomy
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreWellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreThis study aims to study some morphological and reproductional characteristics in eleven species of two genera belonging to the family of Asparagaceae, which are Bellevalia Lapeyrouse, 1808 and Ornithogalum Linnaeus, 1753 and the species are: Bellevalia chrisii Yildirim and Sahin, 2014; Bellevalia flexuosa Boissier, 1854; Bellevalia kurdistanica Feinbrun, 1940; Bellevalia longipes Post, 1895; Bellevalia macrobotrys Boissier, 1853; Bellevalia paradoxa Boissier, 1882; Bellevalia parva Wendelbo, 1973; Bellevalia saviczii Woronow, 1927; Ornithogalum brachystachys C. Koch, 1849; Ornithogalum neurostegium Boissier, 1882 and Ornithogalum pyrenaicum Linnaeus, 1753. These species were identified and compared with each other; the results showed th
... Show MoreAn abstract is a brief summary of a research article, thesis, Schiff base ligand (L) was prepared by the reaction of 4-aminantipyrine with o-phenylenediamine, the prepared ligand characterized by Micro elemental Analysis, FT. IR, UV-Vis, and 1H,13C-NMR spectroscopy.complexes of Mn(II), Co(II), Ni(II), Cu(II) and Hg(II) with Schiff base and 1,10-phenanthroline (Phen) have been investigated in aqueous ethanol with (1:1:1) (M:L:Phen). The prepared complexes were characterized using flame atomic absorption, (C. H. N) Analysis, FT. IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. From the obtained data the octahedral structure was suggested for all complexes. The biological screening effects o
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreDoxycycline hyclate is an antibiotic drug with a broad‐spectrum activity against a variety of gram‐positive and gram‐negative bacteria and is frequently used as a pharmacological agent and as an effector molecule in an inducible gene expression system. A sensitive, reliable and fast spectrophotometric method for the determination of doxycycline hyclate in pure and pharmaceutical formulations has been developed using flow injection analysis (FIA) and batch procedures. The proposed method is based on the reaction between the chromogenic reagent (V4+) and doxycycline hyclate in a neutral medium, resulting in the formation of a yellow compound that shows maximum absorbance at 3
Public spending represents the government’s financial leverage and has a significant impact on real and monetary economic variables, and one of these effects is the effect of public spending on the exchange rate as an important monetary variable for monetary policy, As we know that public spending in Iraq is financed from oil revenues sold in US dollars, and the Ministry of Finance converts the US dollar into Iraqi dinars to finance the government's need to spend within the requirements and obligations of the state's general budget, And converting the US dollar into Iraqi dinars has an impact on the parallel exchange market, even if there is a contractual exchange rate between the Ministry of Finance and the Central Bank of Iraq to
... Show MoreDensity Functional Theory (DFT) method of the type (B3LYP) and a Gaussian basis set (6-311G) were applied for calculating the vibration frequencies and absorption intensities for normal coordinates (3N-6) at the equilibrium geometry of the Di and Tetra-rings layer (6, 0) zigzag single wall carbon nanotubes (SWCNTs) by using Gaussian-09 program. Both were found to have the same symmetry of D6d point group with C--C bond alternation in all tube rings (for axial bonds, which are the vertical C--Ca bonds in rings layer and for circumferential bonds C—Cc in the outer and mid rings bonds). Assignments of the modes of vibration IR active and inactive vibration frequ
... Show More