Background: Ultrasonography has been used to examine the thickness of the lower uterine segment in women with previous cesarean sections in an attempt to predict the risk of scar dehiscence during subsequent pregnancy. The predictive value of such measurement has not been adequately assessed. Objectives: To correlate lower uterine segment thickness measured by trans abdominal ultrasound in pregnant women with previous cesarean section with that measured during cesarean section by caliper and to find out minimum lower uterine segment thickness indicative of integrity of the scar.Methods: A prospective observational study at Elwyia Maternity Teaching Hospital, from January 2011 to January 2012. A total of 143 women were enrolled in the study. Those women who were included were pregnant with gestational age (36-40) weeks, all had history of previous one or more cesarean section. Transabdominal ultrasound measurement of thickness uterine segment thickness done with moderately full bladder before delivery and correlated with these measured directly during operation using a caliper. The sensitivity and specificity of ultrasound calculated with positive and negative predictive value. Results: The sensitivity and specificity of trans abdominal ultrasound in detecting patient at risk of scar dehiscence in patient with previous and cesarean section not starting uterine contractions were very high 90%and 92% respectively with positive and negative predictive value of 90% and 92% respectively with a cut off value of uterine segment thickness of 4.5 mm. It was also has high sensitivity and positive predictive value of 93.4% and 93% respectively with patients that started labor but with low specificity and negative predictive value of 50% and 38% respectively with the same cut off value.Conclusions: Sonographic lower uterine segment thickness is a strong predictor for uterine scar defect in women with prior Caesarean section. However, no ideal cut-off value can yet be recommended, whenever uterine contractions started. But this method carries a high sensitivity and specificity in patients who did not start uterine contractions with a cut-off value of 4.5 mm.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreAryl hydrocarbon receptor (AhR) is a ligand-activated transcription factor and 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) is a potent ligand for AhR and a known carcinogen. While AhR activation by TCDD leads to significant immunosuppression, how this translates into carcinogenic signal is unclear. Recently, we demonstrated that activation of AhR by TCDD in naïve C57BL6 mice leads to massive induction of myeloid derived-suppressor cells (MDSCs). In the current study, we investigated the role of the gut microbiota in TCDD-mediated MDSC induction. TCDD caused significant alterations in the gut microbiome, such as increases in Prevotella and Lactobacillus, while decreasing Sutterella and Bacteroides. Fecal transplants from TCDD-treated
... Show MoreAbstract The aim of this study is preparing an intellectual map according to the feedback (verbally and writhingly ) in order to learn some skills of floor exercises in the women's artistic gymnastics , In addition to that the aim of this study defines on the impacts of intellectual map according to the feedback approach, and to identify the best group between the three groups study in the learning of skills approach in this study, the researchers used the experimental method, the subject of the study included on students second class in physical education and sport sciences , Baghdad University (2014-2015) , and divided into three groups for teaching skills which was under studied .The species used the specific manner by lot for selection
... Show MoreAbstract
The research aims to identify the level of effectiveness of the teaching practices of science and mathematics teachers in light of the national framework for future skills in Omani schools. To achieve the objectives of the study, the researchers used the descriptive approach, as he designed a note card consisting of (30) phrases distributed on three axes: basic skills, practical skills, and technical skills. After verifying the validity and reliability of the tools, they were applied to a sample of (116) teachers. The results of the research revealed that the level of effectiveness of the teaching practices of mathematics teachers has recorded a medium degree with a mean (3.05). The results a
... Show MoreThis research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show More