Examining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant differences among the three sequences used P˂0.05 with the exception of the contrast P˃ 0.05. For the cervical spines (C4-C5), the minimum CNR was noticed with the T2_TFE sequence. For the cervical spines (C5-C6), the CNR and SNR were higher when they were assessed by the 2D T2W TSE sequence as compared to the other sequences. The same findings were observed with the cervical spines (C6-C7). The subjective assessment of the degenerative cervical spine diseases showed that the T2_TFE sequence is excellent in terms of viewing the central stenosis and foraminal stenosis. The best MRI diagnostic imaging can be obtained using the Turbo Field Echo (T2_TFE) and the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE) sequences to gain detailed diagnostic information regarding the central stenosis and foraminal stenosis of the cervical spines (C4-C5, C5-C6, C6-C7)
The success of any work requires the development of prior plans for the success of this work as well as providing the necessary sources of funds for the implementation of those plans, where the start of the research problem of delayed sending project proposals to the Ministry of Planning to do its job oversight in checking the technical and economic of those projects feasibility studies, has sought the researcher to the statement of need activating the role of the Ministry of planning in the study of projects before they are implemented and the trade-offs between important projects and projects the most important as they related to the usefulness of the community as well as the economic feasibility evaluation of them in terms of providin
... Show MoreGrass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreAbstract :
The research aims to Estimate the Strength of Strategic Innovation application in terms of application strength , and on the overall level in number of Iraqi Industrial business organizations . After wards determine whether their is differerences among those organizations in application process for the dimensions , and for the overall process .
The Research revealed number of conclusions including that the process of strategic innovation is applied in a good Level , and demonstrates the desier of the industrial companies Leaders to Launch beyond the familiar products , and to provide new products that
... Show MoreThe problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni
... Show MoreBackground: The beneficial gut bacterium E. coli can cause blood poisoning, diarrhoea, and other gastrointestinal and systemic disorders. Objective: This study amid to examines the antibiofilm activity of Laurus nobilis leaves extract on E. coli isolates and compares pre- and post-treatment gene expression of fimA and papC genes. Subjects and Methods: Ten isolates of E. coli were obtained from the Genetic Engineering and Biotechnology Institute, University of Baghdad, which was previously collected from Baghdad city hospitals and diagnosed by chemical tests, the diagnosis was confirmed using VITEK-2 System. The preparation of the aqueous and methanolic Laurus nobilis leaves extracts was done by using the maceration method and Soxhlet appara
... Show MoreAs they are the smallest functional parts of the muscle, motor units (MUs) are considered as the basic building blocks of the neuromuscular system. Monitoring MU recruitment, de-recruitment, and firing rate (by either invasive or surface techniques) leads to the understanding of motor control strategies and of their pathological alterations. EMG signal decomposition is the process of identification and classification of individual motor unit action potentials (MUAPs) in the interference pattern detected with either intramuscular or surface electrodes. Signal processing techniques were used in EMG signal decomposition to understand fundamental and physiological issues. Many techniques have been developed to decompose intramuscularly detec
... Show MoreQuantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
The research aims to get acquainted with the evaluation of the reality of the application of the curriculum axis from among the eight Iraqi academic accreditation standards in a sample of governmental and private universities and colleges in Iraq and to identify the main and secondary reasons for it as well as to provide proposed mechanisms and procedures to help reduce gaps, If the research problem is represented in the weak availability of the requirements of the curriculum axis in universities and colleges (the study sample) due to the weak documentation and successful implementation of them and interest in them is still below the level of ambition, In order to arrive at scientific facts, the researchers adopted the comparativ
... Show MoreIn this research want to make analysis for some indicators and it's classifications that related with the teaching process and the scientific level for graduate studies in the university by using analysis of variance for ranked data for repeated measurements instead of the ordinary analysis of variance . We reach many conclusions for the
important classifications for each indicator that has affected on the teaching process. &nb
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More