Background .To know the incidence of adenoid hypertrophy in adults causing nasal obstruction and other nasal complains.
Methods.Prospective studyof(140 ) adult patientstheir main chief complaint were nasal obstruction , presented to Otolaryngology department at Aljumhory Teaching Hospital in Mosul , from the period (september 2010 to september 2011) ,their age ranged from (21 to 53) years . They were investigated clinically, radiologicaly ,and nasal endoscopic examination was carried out (rigid and fibro-optic ) . Adenoidectomy was performed for those with adenoid hypertrophy and sent for histopathological study .
Results:. we found adenoid enlargement in(24) patients (17.14%),in addition to nasalobstruction they were also complaining of Post nasal discharge (19) patients, followed by snoring (17) patients , headache and facial pain (15) patients, deafness and tinnitus (8) patients and other rhinologicalsymtoms. The patients were followed up for a period ranged from (4 -16) months. We found that (91.6%) were relieved of their nasal obstruction, (82.3%) were relieved from snoring .
Other nasal symptoms ; post nasal discharge, headache and facial pain, sore throat and tonsillitis, deafness , tinnitus ,rhinorrhia, Rhinolaliaclausa, otalgia were improved in (68.4% - 50%).
Conclusions:Nasal obstruction ,snoring ,post-nasal discharge ,and aural symptoms were often caused by adenoid enlargements in adults .
Because the examination of the nasopharynx was inadequate ,many cases of enlarged adenoid were misdiagnosed. Adenoid enlargements in adults should always borne in mind as a cause of nasal obstruction and other rhinological symptoms. Nasal endoscopic examination including the nasopharynx should be done for proper diagnosis.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreThe topic of supra.topological.spaces considered one of the important topics because it is a generalization to topological.spaces. Many researchers have presented generalizations to supra open sets such as supra semi.open and supra pre.open sets and others. In this paper, the concept of δ∼open sets was employed and introduced in to the concept of supra topology and a new type of open set was extracted, which was named S∼δ∼open. Our research entails the utilization of this category of sets to form a new concepts in these spaces, namely S∼δ∼limit points and S∼δ∼derive points, and examining its relationship with S∼open and S∼reg∼open. Based on this class of sets, we have introduced other new concepts such as S∼isolate
... Show MoreThis research is a pragmatic study of political blame in British and Iraqi Parliaments. It aims to unfold the similarities and/or differences in terms of the pragmatic and pragma-rhetorical strategies used by British and Iraqi politicians when they exchange blame in both offensive and defensive situations. A statistical analysis is conducted to quantitatively support the findings of the pragmatic analysis. The analyses conducted have yielded different results among blame is a process composed of two stages. Each stage is distinct for its pragmatic components and pragma-rhetorical strategies. British and Iraqi MPs at the blame stage tend to utilize impoliteness as their main strategy. However, British and Iraqi MPs perform differently at the
... Show MoreThe present study was designed to evaluate the immunological status in a sample of Iraqi males with primary infertility and them age range18-55 years, who were attending the Centre of Infertility and in vitro Fertilization (Kamal Al-Samaraie Hospital, Baghdad) during the period December 2008 – April 2009. They were divided into three groups; 40 patients with anti-sperm antibodies (ASA), 20 patients with Asthenozoospermia (AST) and 20 patients with azoospermia (AZO). In adition to20 fertile males was as control group. The parameters of evaluations were standard seminal fluid analysis, anti-sperm antibodies and anti-mitochondrial antibodies in serum, Therefore, two types of samples were collected from each subject; seminal fluid and blood.
... Show MoreIn the South of yement, when the accupation of Aden in 1839 by the British, British politics has proceeded in accordance with interests in promoting the existence and exploitation of this important site to implement their interests. Historians believe that Britain played a major role in the conflicts that have taken place on the land of Yemen, through a series of military and political dealings between them and the Ottoman Empire prior to withdrawal of Yemen and between local authorities and power to Yemen, such interactions have led to very serious consequences for the future of Yemen and Yemen was often divided into three parts, the northern areas under the authority of Imam Yahya, and the South, under the control of Britain, Asir and
... Show MoreSecurity reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreThis study designed to evaluate the relationship between the Matrix metalloproteinase -9(MMP-9), soluble Vascular endothelial cadherin(VE-CAD)and Chlamydia pneumonia infection in cardiovascular diseases patients. All blood sample were subjected for molecular detection of C.pneumoniae by using conventional polymerase chain reaction (PCR) depending on 16S rRNA while the level of serum MMP-9, VE-CAD measured by enzyme linked immunosorbent assay (ELISA). Seventy patients who suffering from cardiovascular diseases (angina, myocardial infraction and atherosclerosis) aged between 33-86 years have been investigated and compared to twenty of apparently healthy individuals as control group. Twenty six samples (37.14%) revealed positive results for C.
... Show More