Extracorporeal shock wave lithotripsy (ESWL) is considered a standard treatment for nephrolith or kidney stones measuring less than 20 mm. Anatomical, machine-related, and stone factors play pivotal roles in treatment outcomes, the latter being the leading role. This paper examined the relationship between stone density on native CT scans and ESWL treatment to remove renal stones concerning several treatments. One hundred and twenty patients (64 males and 56 females) were enrolled and completed the study from April 2019 to September 2020. Inclusion criteria were a single renal pelvis stone of 5–20 mm to be treated for the first time in adult patients with no urinary or musculoskeletal anatomical abnormalities. We assessed patients' renal function and obtained stone characteristics using a native CT scan. Patients were then scheduled for ESWL by the same machine and operator under fluoroscopy, with two-week intervals between treatment sessions when more than one treatment session was required. Before each new session, a new KUB-US was performed to reevaluate the stone. One hundred and twenty patient records were analyzed, 64 (53.3%) males and 56 (46.7%) females, with a mean age of 38.6 years and a mean stone size of 13.15 mm. Treatment with ESWL cleared stones in 76 (63.3%) patients, while 44 (36.7%) failed the treatment. The mean stone density in patients whose stones were cleared was significantly lower (661
A series of experiments were conducted for the first time in Iraq to evaluate the efficiency of five plant leaves extracts (Ibicella lutea, Nerium oleander, Clerodendron inerme, Allium cepa and Eucalyptus spp.) in treating the common carp (Cyprinus carpio) infected with monogenetic trematodes of genera Dactylogyrus. Five different concentrations of such extracts were used to bathe fishes for 5,10,15,20 and 25 minutes. A concentration of 15% A. cepa for 25 minutes of bath exposure was affective in trematode eradication. Extracts of both Eucalyptus and N. oleander at a concentration of 10% each were also affective for ten minutes exposure. Extracts of C. inerme had no any effect on such parasites. On the otherhand, extracts of 1. hitea caused
... Show MoreThe dynamic development of computer and software technology in recent years was accompanied by the expansion and widespread implementation of artificial intelligence (AI) based methods in many aspects of human life. A prominent field where rapid progress was observed are high‐throughput methods in biology that generate big amounts of data that need to be processed and analyzed. Therefore, AI methods are more and more applied in the biomedical field, among others for RNA‐protein binding sites prediction, DNA sequence function prediction, protein‐protein interaction prediction, or biomedical image classification. Stem cells are widely used in biomedical research, e.g., leukemia or other disease studies. Our proposed approach of
... Show MoreIt was recorded that Terpinen-4-ol has an anti-parasitic properties, so it will be noteworthy to intensify the studies about this compound.
This study aims to test the effectiveness of terpinen-4-ol on amastigote forms of Leishmania parasite in macrophages.
This effect was studied by adding increasing concentrations of Terpinen-4-ol to culture wells containing mouse macrophages that were previously incubated with the promastigote forms of the parasites for 24 hours .Then, they were incubated for another 24 hours with increasing concentrations of Terpinen-4-ol. After, Parasites were enumerated into macrophages in wells either treated with Terpinen-4-ol or in control wells.
Treatment with Ter
... Show MoreThe objective of this study is to highlight the skills of office managers and it's impact on the effectiveness of time management in the institutes and faculties of middle technical university and a group of cognitive and practical aims. The managers skills forms mthe modern trend and the main source to provide organizations with highly skilled managers with distinctive performance and because of the sharp changes in the environment which today's organizations works in it , business organizations generally and managers especially realise the importance of time management and it's role in achieving competitive advantage . The problem of this study raised from this point which reflect the extent of departments managers realisation
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThis paper contains an equivalent statements of a pre- space, where are considered subsets of with the product topology. An equivalence relation between the preclosed set and a pre- space, and a relation between a pre- space and the preclosed set with some conditions on a function are found. In addition, we have proved that the graph of is preclosed in if is a pre- space, where the equivalence relation on is open.
On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show More