Background: Fiber-optic endoscopy is an important
investigation of the large intestine, whether or not the
radiologist (barium enema) has discovered a lesion in
the bowel. Colonoscopy affords a unique opportunity
to direct visualization of entire colonic mucosa. At
the same time, the physician can obtain biopsy specimens, remove polyps, and decompress volvuli.
Most experienced endoscopists and well prepared
patients can reach the cecum in over 90% of patients.
If colonoscopy is properly performed, it has a low
risk of complications, such as perforation and bleeding.
Methods: A total of 70 consecutive patients admitted
to Endoscopy department at Al-Kindy Teaching hospital from September- 2008 to July-2009. Bowel
preparation was achieved with Polyethylene glycol
lavage solution and 165 cm Pentax colonoscope
EC_3385FK 4.2 was used in all cases. All patients
were not sedated or given any other medication
Results:Seventy colonoscopies were performed in
this study. Forty of them were male and the rest were
female. The mean age was 42 years ranging from 4
years to 85 years. The most common indication for
colonoscopy was rectal bleeding (44%) Polyethylene
glycol lavage solution was used in all patients for
bowel preparation. All patients did not receive premedications. Complete colonoscopy examination was
done in (12.8%) of patients, the most common cause
of incomplete examination was poor bowel preparation (50%). No complications were reported.
Conclusions: Rectal bleeding was the most common
indication for colonoscopy. Poor bowel preparation
was the main cause of incomplete colonoscopy.
In this paper, series of new complexes of Manganese(II), Cobalt(II), Nickel (II) Cupper(II) Zinc(II), Cadmium(II) and Mercury (II) are prepared from the new ligand [2-(3-benzoylthioureido)-3-(-4- hydroxyphenyl) propanoic acid (BHP) derived from tyrosine and benzoylisothiocyanate .Chemical structures are obtained from their 1 H, 13CNMR spectra (for BHP), elemental microanalyses, molar conductance, FTIR, UV–Vis, magnetic susceptibility in addition to TGA/DTG and DSC analysis, the suggested geometry for all complexes was tetrahedral. The biological activity of BHP and its complexes has been extensively studied against two bacterial species Staphylococcus aurous (G+) and Escherichia coli (G-) by agar-well diffusion technique, where Mn(II), Co
... Show MoreThe current article focuses on studying the social organization reality of the Iraqi society; it aims to construct an Iraqi organized personality that believe in the principles of Islamic religion by making use of the sociology thoughts in explaining the strength of social organization, and the causes of social deviance in attempt of decreasing the deviance and strengthening the cohesion of Iraqi character.
The researchers put forward some questions: to what extent the western theoretical pattern can succeed in explaining the social organization of the Iraqi society? What is the more appropriate western theory for diagnosing the cohesion and deviance of the society? What is the s
... Show MoreA field experiment was conducted to grow the wheat crop during the fall season 2020 in Karbala province, north of Ain Al-Tamr District in two locations of different textures and parent materials. The first site (calcareous soil) with a sandy loam texture, is located at (44° 40′ 37′) east longitude and (32° 41′ 34′) north latitude, at an altitude of 32 m above sea level, and an area of 20 hectares. As for the second location (gypsum soil) with a loam texture, it is located at a longitude (45° 41′ 39′) east and a latitude (33° 43′ 34′ north) and at an altitude of 33 m above sea level and an area of 20 hectares. To find out the effect of different tillage systems on water productivity and wheat yield under center pivot irri
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreThere are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show More