Abstract Kidney stones are one of the most common and most painful medical problems known (1). Nurses assess and monitor patients through diagnosis and treatment and teach patients how to avoid recurrence of stones (2). A descriptive study was conducted on 150 patients diagnosed with recurrent kidney stones, who were attending the out patients consultation urology disease clinics at surgical specialties, Al-Kadhimia, Al-Yarmook, and Al-Karama Teaching Hospital and Extracorporeal shock wave lithotripsy (ESWL) departments for the period from the 1st of Feb. 2002 through to the end of May 2004. The aim of the study is to assess the post-operative follow-up for patients with recurrent kidney stones. None- probability (purposive sample) of 150 patients with recurrent kidney stones The reliability and validity of the instrument were determined through a pilot study. The data were collected through the use of constructed questionnaire and analysis through the application of descriptive statistical analysis procedures which included. (Frequency, percentage, mean score, stander deviation, relative sufficiency) and application of inferential statistical analysis which included the (Chi-square)
Today, there are large amounts of geospatial data available on the web such as Google Map (GM), OpenStreetMap (OSM), Flickr service, Wikimapia and others. All of these services called open source geospatial data. Geospatial data from different sources often has variable accuracy due to different data collection methods; therefore data accuracy may not meet the user requirement in varying organization. This paper aims to develop a tool to assess the quality of GM data by comparing it with formal data such as spatial data from Mayoralty of Baghdad (MB). This tool developed by Visual Basic language, and validated on two different study areas in Baghdad / Iraq (Al-Karada and Al- Kadhumiyah). The positional accuracy was asses
... Show MoreIn this research, the preparation of bidentate Schiff base was carried out via the condensation reaction of both the salicylaldehyde with 1-phenyl-2,3-dimethyl-4-amino-5-oxo-pyrazole to form the ligand (L). The mentioned ligand was used to prepare complexes with transition metal ions Mn(II), Co(II), Ni(II), Cu(II) and Zn(II). The resulting complexes were separated and characterized by FTIR and UV-Vis spectroscopic technique. Elemental analysis for Carbon, Hydrogen and Nitrogen elements, electronic spectra of the ligand and complexes were obtained, and the magnetic susceptibility tests were also achieved to measure the dipole moments. The molar conductivities were also measured and determination of chlorine content in the complexes and
... Show MoreThe current research was aimed at the following:
1. Measurement of Personality Type Observer of the University students.
2. Identify the differences in Personality Type Observer among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary)
3. Measurement of Withdrawal of the University students.
4. Identify the differences in Withdrawal among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary).
5. Identify the relationship between Personality Type Observer and Withdrawal.
To achieve this aims of the research, the researchers set up the instrument is scale
The proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue
... Show MoreDocument clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.