Bedside clinical teaching is a fundamental part of the medical education that offers invaluable opportunities for the students to build and improve their clinical and communication skills. However, there is a growing concern about the increasing refusal of patients to participate in clinical sessions, especially in certain settings where there are sensitive cultural traditions and decreased trust in institutions.
This paper discusses patient refusal duri
Transmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreA genetic algorithm model coupled with artificial neural network model was developed to find the optimal values of upstream, downstream cutoff lengths, length of floor and length of downstream protection required for a hydraulic structure. These were obtained for a given maximum difference head, depth of impervious layer and degree of anisotropy. The objective function to be minimized was the cost function with relative cost coefficients for the different dimensions obtained. Constraints used were those that satisfy a factor of safety of 2 against uplift pressure failure and 3 against piping failure.
Different cases reaching 1200 were modeled and analyzed using geo-studio modeling, with different values of input variables. The soil wa
The research aimed to shed light on the impact of international Accounting Standard No (21) on tax obstacles represented by (tax evasion, double taxation) The financial statements of a group of banks operating in the private sector were relied upon to know the impact of the standard on tax obstacles, as well as knowing the amount of amounts, The researcher relied on the method of financial analysis of that data, which was obtained from the website of the Securities Commission, and conducted personal interviews with a number of university professors, chartered accountants, financial experts, banks, and the General Authority for Taxes to benefit from their
... Show MoreIn this research an Artificial Neural Network (ANN) technique was applied for the prediction of Ryznar Index (RI) of the flowing water from WTPs in Al-Karakh side (left side) in Baghdad city for year 2013. Three models (ANN1, ANN2 and ANN3) have been developed and tested using data from Baghdad Mayoralty (Amanat Baghdad) including drinking water quality for the period 2004 to 2013. The results indicate that it is quite possible to use an artificial neural networks in predicting the stability index (RI) with a good degree of accuracy. Where ANN 2 model could be used to predict RI for the effluents from Al-Karakh, Al-Qadisiya and Al-Karama WTPs as the highest correlation coefficient were obtained 92.4, 82.9 and 79.1% respectively. For
... Show MoreBackground: Complete denture wearers show lower levels of bite force than dentate subjects. This has a significant influence on their chewing efficiency. In this study an attempt was made to investigate the effect of the impression technique on the maximum bite force in complete denture wearers. Materials and methods: The patients selected for this research were 12 edentulous patients. Three different techniques for registering the final impression were made; the mucostatic, mucofunctional, and the selective pressure impression technique. Two sets of upper and lower denture bases and one set of upper and lower dentures were constructed for each subject. Intraoral and extraoral instruments and devices, as well as a computer program were used
... Show MoreBackground: Excision repair cross-complementing group 2 gene (ERCC2) polymorphisms have been linked as being a risk factor for colorectal cancer (CRC) emergence. However, data from several studies are contradictory. To validate genetic biomarkers of the CRC; the impact of the following ERCC2 polymorphism (rs1799793 and rs238406) was examined on CRC susceptibility among sample of Iraqi population. Methods: A total of 126 subjects were enrolled in this case control study; 78 CRC patients and 48 apparently healthy individuals who are age, gender, smoking status and BMI matched. Polymerase chain reaction (PCR) was used for genotyping, followed by sequencing then the association between genetic polymorphisms and CRC risk was investigate
... Show MoreThis research attempts to investigate narrative structure in oral narrative particularly in Oprah's Show from a sociolinguistic viewpoint. Narrative is said to be universal in the sense that it is found in all times and places. There is no society or culture without narrative. Oral narrative is organized in a specific order. The research aims at studying and analyzing this order. In addition to that, it highlights the importance of narrative in conveying some moral messages to people who are listening to the story. The study is divided into two parts; theoretical and practical. The theoretical part draws on presenting a survey of literature which includes definitions and explanations of some related terms. The practical part is concerned
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More