This study aimed to compare the safety and efficacy of laser lithotripsy and pneumatic lithotripsy, the two most commonly used transurethral lithotripsy methods for treating bladder stones in children in Iraq. Between January 2013 and December 2016, 64 children with bladder stones were included in this prospective randomized study, after ethical committee approval and written consent from the children’s parents or caregivers were obtained. Patients were assigned randomly by computer software to two groups treated with either pneumatic cystolithotripsy or laser lithotripsy. A 9 Fr. semirigid ureteroscope was used to pass the lithotripter through and fragment the stone. A catheter of 8–12 Fr. was then introduced and kept in place for 24 h. All children were hospitalized for 24 h, and the catheter was removed the next morning. Outpatient follow-up was maintained for 6–12 months. In terms of operation outcomes and complications, the laser lithotripsy group had a significantly longer duration of operation (74.5 ± 26.6 min vs. 51.5 ± 17.2 min, p = 0.001), whereas the number of patients requiring an extended hospital stay was significantly higher in the pneumatic lithotripsy group (48.5% vs. 16.1%, p = 0.006). Moreover, pneumatic lithotripsy was associated with a significantly greater risk of having at least one adverse effect (64% greater than that in the laser group). Stone clearance rates did not significantly differ between treatment groups. In conclusion, both pneumatic and laser lithotripters can be used to treat children with bladder stones with high efficacy and safety.
The importance of this study of the growing importance of perception of touch and its association with the job performance of industrial product since the perception stereotactic means he means practiced by the individual through job performance and has assets of knowledge in the mind of the user and require him to mind the capabilities and knowledge cognitive following their individual focus Zhennea.oanfalh following their enthusiasm when using Sense of touch. The study in the first chapter of the research problem to reveal the role played by the process of cognition and its relationship with the touch function of the industrial product and the associated defect in performance and harder to use. The study also pointed to the research ob
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite
... Show MoreThis research aims to know the essence of the correlative relationship between tactical thinking and solving mathematical problems. The researchers followed the descriptive research method to analyze relations, as all students from the mathematics department in the morning study were part of the research group. The research sample of (100) male and female students has been chosen based on the arbitrators' views. The tools for studying the sample of research composed of (12) items of the multiple-choice test in its final form to measure tactical thinking and require establish-ing a test of (6) test-type paragraphs to solve mathematical problems. The findings showed that sample students' tactical thinking and their capacity to overcome mathem
... Show MorePhotovoltaic devices (PVs) were fabricated by spray-coating an ink of copper indium diselenide CuInSeR 2 R(CIS) nanocrystals as the light-absorbing layer. Without high-temperature post-deposition annealing, PVs were made on glass substrates with power conversion efficiencies of up to 1.5% and 0.9%, for Au and Mo coated respectively, under AM 1.5 illumination. UV–Vis spectrophotometer in the wavelength range 350–1500 nm. X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis it is evident that CuInSeR 2 R have the chalcopyrite structure as the major phase and no secondary phase with a preferred orientation along (112) direction and The atomic ratio of Cu : In : Se in the nanocrystals is nearly 1 : 1 : 2.
The direct electron transfer behavior of hemoglobin that is immobilized onto screen-printed carbon electrode (SPCE) modified with silver nanoparticles (AgNPs) and chitosan (CS) was studied in this work. Cyclic voltametry and spectrophotometry were used to characterize the hemoglobin (Hb) bioconjunction with AgNPs and CS. Results of the modified electrode showed quasi-reversible redox peaks with a formal potential of (-0.245 V) versus Ag/AgCl in 0.1 M phosphate buffer solution (PBS), pH7, at a scan rate of 0.1 Vs-1. The charge transfer coefficient (α) was 0.48 and the apparent electron transfer rate constant (Ks) was 0.47 s-1. The electrode was used as a hydrogen peroxide biosensor with a linear response over 3 to 240 µM and a detection li
... Show MoreSinging has significant importance being a major basis for the expressive and cultural production of the societies and a real companion that reflects their artistic career and is strongly connected to the reality of the peoples and the production of the individuals, who are geniuses of arts and culture.
Rural singing represents one of the most well-known artistic singing styles in Iraq, which truly embodied the Iraqi national identity. However, it remained confined to the countryside and did not spread due to the lack of mass media and the recording technologies at that time. It has been pure virgin singing art. The theoretical framework is divided into three axes:
• The Iraqi singing heritage in the twentieth century, a hi
... Show MorePoly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More