Background: Menstrual problems with all manifestations ranging from life-threatening bleeding to amen- orrhea are considered patterns of abnormal uterine bleeding (AUB), which is until now a popular reason for referral to the gynaecologic clinic and requires a special diagnostic tool. Objective: To assess the accuracy of hysteroscopy in diagnosing endometrial pathologies and to compare it with sonographic and histopathologic reports. Patients and Methods: A prospective study conducted in the Baghdad Teaching Hospital on 60 Iraqi females having varying complaints from abnormal uterine bleeding in pre- and post-menopausal women, infertility, and chronic pelvic pain with normal or abnormal ultrasound findings. Office hysteroscopy was done and an endometrial biopsy was obtained for histopathology for a period of 10 months between September 2020 and June 2021. Results: The current study showed that hysteroscopy was more accurate in diagnosing sensitivity of endo- metrial poly (100%), fibroids (83%), hyperplasia (84.2%), and cancer (50%) whereas ultrasounds were more accurate in diagnosing sensitivity to endometrial myoma (90%). Hysteroscopy and ultrasound showed low sensitivity in detecting endometrial cancer (50% and 34%, respectively). Conclusion: Although a transvaginal ultrasound was considered an integral part in the diagnosis of endo- metrial pathologies, it can be used for initial investigation, however, when suspecting endometrial pathol- ogy, hysteroscopy can be more advanced for evaluation, immediate treatment of endometrial masses, and obtaining targeted biopsies. Hysteroscopy showed high sensitivity in detecting endometrial polyps.
The current research aims to determine the necessary linguistic competencies for Arabic language teachers of the preparatory stage (fourth grade preparatory), which were five main competencies: Arabic grammar competencies, literary competencies, cultural competencies, rhetorical competencies, and expression competencies. To achieve the objective of the research, the researcher developed a questionnaire as the main tool for collecting data based on literature, it consists of (28) items including the five main competencies. The questionnaire was administered to (60) male and female teachers at Al-Karkh's first Education Directorate in the city of Baghdad. The findings of the research indicated that Arabic language proficiency got the highe
... Show MoreIn this paper, thermal properties were performed by using semi-empirical theoretical calculations to study the molecular structure of a nonlinear molecular system, the (S2F2) molecule in the infrared region, by using semi-empirical quantum programs in the (MNDO / PM3) method. This study is under the condition of obtaining the stable structure of the molecule in which the molecule obtains the minimum value of the total energy. The thermodynamic properties were also calculated, including the heat of formation, whose value was (-61.002kcal / mol), the entropy and its value (78.2916 cal / mol.k), as well as the heat capacity (15.9454 cal / mol.k) and the enthalpy (3763.434 cal /mol), Gibbs F
... Show MoreMany conservative sphincter-preserving procedures had been described to be effective in
healing of anal fistula without excision or de roofing.
Objective: To verify the outcome of mere photocoagulation of the fistula tract on healing of low anal
fistula.
Materials and Methods: Using 810nm diode laser, the tracts of low anal fistulae in a cohorts of six male
patients (mean age of 32 yr) had been photocoagulated by retrograde application of laser light through an
orb tip optical fiber threaded in to the tract. Swabs for culture and sensitivity testing were obtained before
and after laser application. Patients were followed up regularly to announce fistula healing.
Results: Mean laser exposure time was 6.6 min., mean
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreThis paper presents the ability to use cheap adsorbent (corn leaf) for the removal of Malachite Green (MG) dye from its aqueous solution. A batch mode was used to study several factors, dye concentration (50-150) ppm, adsorbent dosage (0.5-2.5) g/L, contact time (1-4) day, pH (2-10), and temperature (30-60) The results indicated that the removal efficiency increases with the increase of adsorbent dosage and contact time, while inversely proportional to the increase in pH and temperature. An SEM device characterized the adsorbent corn leaves. The adsorption's resulting data were in agreement with Freundlich isotherm according to the regression analysis, and the kinetics data followed pseudo-first-or
... Show MoreImage classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More