This study aimed to compare the safety and efficacy of laser lithotripsy and pneumatic lithotripsy, the two most commonly used transurethral lithotripsy methods for treating bladder stones in children in Iraq. Between January 2013 and December 2016, 64 children with bladder stones were included in this prospective randomized study, after ethical committee approval and written consent from the children’s parents or caregivers were obtained. Patients were assigned randomly by computer software to two groups treated with either pneumatic cystolithotripsy or laser lithotripsy. A 9 Fr. semirigid ureteroscope was used to pass the lithotripter through and fragment the stone. A catheter of 8–12 Fr. was then introduced and kept in place for 24 h. All children were hospitalized for 24 h, and the catheter was removed the next morning. Outpatient follow-up was maintained for 6–12 months. In terms of operation outcomes and complications, the laser lithotripsy group had a significantly longer duration of operation (74.5 ± 26.6 min vs. 51.5 ± 17.2 min, p = 0.001), whereas the number of patients requiring an extended hospital stay was significantly higher in the pneumatic lithotripsy group (48.5% vs. 16.1%, p = 0.006). Moreover, pneumatic lithotripsy was associated with a significantly greater risk of having at least one adverse effect (64% greater than that in the laser group). Stone clearance rates did not significantly differ between treatment groups. In conclusion, both pneumatic and laser lithotripters can be used to treat children with bladder stones with high efficacy and safety.
The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreIn this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels
... Show MoreSweet pepper (Capsicum annuum L.) is an economically important vegetable crop. Wilt disease caused by Fusarium oxysporum f. sp. capsici is a specific pathogen that affects the pepper. Four isolates of F. oxysporum f. sp. capsici Fo3, Fo6, Fo7 and Fo8 were obtained from diseased pepper plants that were collected from different pepper fields in Baghdad. Fo6 isolate that has high pathogenicity to pepper seeds, Trichoderma harzianum (Th) was tested in vitro against F. oxysporum f. sp. capsici showed a high inhibition rate for the isolate Fo6, the concentration of chelated iron Fe-EDDHA 0.5% reduced the radial growth of Fo6 whi
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThe study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreA series of new imides compounds[1-4] were synthesized from reaction of tetrachlorophthalic anhydride or nitro phthalic anhydride or malic anhydride or Succinic anhydride with 4-amino benzene thiol under fusion conditions. Chloroacetic acid has been added after compounds [1-4] reacted with distilled H2O and Na2CO3, producing compounds [5-8]. In benzene, compounds [5-8] also interacted with the thionyl chloride to produce [9-12]. Poly (vinyl alcohol) was chemically modified by reacting PVA with compounds [9-12] and dimethyl formamide to produce compounds [13-16]. Iron oxide nanoparticles (IONPs) are mixed with modified PVA [13-16] to create nanocomposites [17-20]. Spectral and analytical data from synthesized compounds, such as 1
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More