Bac kground:: Septal deviation is one of the commonest anatomical deformities of the nasal skeleton, this deviation is usually accompanied by compensatory hypertrophy of the inferior turbinate on the concave side that will accentuate the severity of nasal obstruction.
Objectives: To evaluate the effect of septoplasty on the size of the inferior turbinate in patients with nasal septum deviation.
Methods: This is a prospective study of 25 patients attending the otolaryngological department at Al-Jirahat teaching hospital from September 2011 to November 2013, complaining mainly of nasal obstruction. Otolaryngological examination had shown nasal septum deviation. The cross sectional areas of inferior turbinates were measured with computed tomography preoperatively & one year postoperatively. All the patients were treated by septoplasty alone without inferior turbinate surgery. Res ull tts :: The cross-sectional areas of inferior turbinates on the concave side were significantly decreased after 1 year of septoplasty, & significantly increased on the convex side. Conc llus iions :: Septoplasty alone without turbinate surgery in patients with nasal septum deviation & compensatory inferior turbinate hypertrophy may be effective in reversing the size of inferior turbinate.
This study aims to impact statement played by banking governance according to the decisions of the Basel Committee in achieving the strategic objectives of the banks, But order to achieve the this goal has been the adoption of two hypotheses in addition to the two main hypotheses as sub answered preliminary The study seeks to verify their health and two (no correlation relationship and impact between Banking governance and achieve strategic objectives), has been tested hypotheses. Study has reached
... Show MoreWe present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.
Allowing Iraqi companies to use multiple systems and policies leads to varying levels of disclosure and no high symmetry between report preparers and users, and that the adoption of integrated reporting can reduce information asymmetry. The theoretical side addressed the concepts of these variables, and in the practical side the binary variable (0, 1) was used. To compensate for the value of the independent variable (integrated reporting) based on the Central Bank of Iraq’s classification of banks according to the (CAMLES) index, and the dependent variable (information asymmetry) was measured through two measures (price difference, unusual return), the research community was represented by (5) Banks out of the total of banks li
... Show MoreThe aim of the current research is to reveal the effect of using brain-based learning theory strategies on the achievement of Art Education students in the subject of Teaching Methods. The experimental design with two equal experimental and control groups was used. The experimental design with two independent and equal groups was used, and the total of the research sample was (60) male and female students, (30) male and female students represented the experimental group, and (30) male and female students represented the control group. The researcher prepared the research tool represented by the cognitive achievement test consisting of (20) questions, and it was characterized by honesty and reliability, and the experiment lasted (6) weeks
... Show MoreAbstract
The objective of this research is to analyze the relationship between the strategic planning for human resources and career path, and I have tested Search the Ministry of Health and some health centers headquarters in the Karkh district, that is applied in sample Consist of (45) Deputy Director, Head of Depts, Departmental Manager, and health center Manager.
Find interested in studying the two subjects are important and vital, at the level of organizations at the present time, namely the strategic planning of human resources and career path. To achieve the objectives of the research was designed Qusestionnair (31) items to collect Primary data. and collected t
... Show MoreThe global trend towards the use of fair value accounting is increasing, so the current study aimed to maximize the impact of fair value application on achieving relevance and representation faithfulness of accounting information in accordance with the common conceptual framework. To achieve the objective of this study, the researcher has determined in the theoretical framework the relationship of fair value with the characteristics of relevance and representation faithfulness of accounting information and the extent of achieving these characteristics, as well as conducting a field study by preparing a questionnaire distributed to a sample of academics (50) and auditors (50) with a total number of selected participants (100) of acad
... Show MoreThis paper presents a three-dimensional Dynamic analysis of a rockfill dam with different foundation depths by considering the dam connection with both the reservoir bed and water. ANSYS was used to develop the three-dimensional Finite Element (FE) model of the rockfill dam. The essential objective of this study is the discussion of the effects of different foundation depths on the Dynamic behaviour of an embanked dam. Four foundation depths were investigated. They are the dam without foundation (fixed base), and three different depths of the foundation. Taking into consideration the changing of upstream water level, the empty, minimum, and maximum water levels, the results of the three-dimensional F
The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t