Background: Spleen is a hemopoietic organ which is capable of supporting elements of different systems. It is affected by several groups of diseases; inflammatory, hematopoietic, reticuloendothelial proliferation, portal hypertension and storage diseases. Ultrasound (US) may detect mild splenomegaly before it is clinically palpable. Knowledge of the normal range of spleen size in the population being examined is a prerequisite. Racial differences in splenic length could result in incorrect interpretation of splenic measurements and such differences would make it difficult to standardize expected splenic length and to determine non- palpable splenic enlargement.Objectives: To measure the normal values of splenic lengthin Iraqi subjects and compare the results with western,Chinese and Jordanian data; to determine whether there is aconstant ratio of the length of the spleen to the left kidney,which could be used to diagnose splenomegaly withoutreference to a nomogram.Methods: This is a cross-sectional study conducted among a total of 280 subjects ranging in age from birth to 20 years (159 males and 121 females). US was used to measure maximum splenic and left kidney lengths to obtain normal values for splenic length and to determine spleen to left kidney ratio. The subjects were divided into the same age groups as those used by other similar international studies in order that comparisons with their results could be made.Results: Splenic lengths in Iraqi subjects are similar to those in American, Chinese and Jordanian subjects up to the age of 15 years. The spleen to left kidney ratio is strikingly constant with a mean value of 1. Using 2 SD above the mean as a guide, the upper limit of normal for spleen to left kidney ratio is 1.25.Conclusion: Splenomegaly should be suspected in children if the spleen is more than 1.25 times longer than the adjacent kidney.Key words: Spleen, subjects, ultrasound
This paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,
... Show MoreIn this work, the switching nonlinear dynamics of a Fabry-Perot etalon are studied. The method used to complete the solution of the differential equations for the nonlinear medium. The Debye relaxation equations solved numerically to predict the behavior of the cavity for modulated input power. The response of the cavity filled with materials of different response time is depicted. For a material with a response time equal to = 50 ns, the cavity switches after about (100 ns). Notice that there is always a finite time delay before the cavity switches. The switch up time is much longer than the cavity build-up time of the corresponding linear cavity which was found to be of the order of a few round-trip ti
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThis paper presents a study to investigate the behavior of post-tensioned segmental concrete beams that exposed to high-temperature. The experimental program included fabricating and testing twelve simply supported beams that divided into three groups depending on the number of precasting concrete segments. All specimens were prepared with an identical length of 3150 mm and differed in the number of the incorporated segments of the beam (9, 7, or 5 segments). To simulate the genuine fire disasters, nine out of twelve beams were exposed to a high-temperature flame for one hour. Based on the standard fire curve (ASTM – E119), the temperatures of 300◦C (572◦F), 500◦C (932◦F), and 700◦C (1292◦F) were adopted. Consequently,
... Show MoreGeologic modeling is the art of constructing a structural and stratigraphic model of a reservoir from analyses and interpretations of seismic data, log data, core data, etc. [1].
A static reservoir model typically involves four main stages, these stages are Structural modeling, Stratigraphic modeling, Lithological modeling and Petrophysical modeling [2].
Ismail field is exploration structure, located in the north Iraq, about 55 km north-west of Kirkuk city, to the north-west of the Bai Hassan field, the distance between the Bai Hassan field and Ismael field is about one kilometer [3].
Tertiary period reservoir sequences (Main Limestone), which comprise many economica
... Show MoreThe research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in
... Show MoreThis work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l
... Show More