Introduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomography (CT) scan of the head illustrated intraventricular haemorrhage. Magnetic resonance imaging (MRI) showed the bag of worms' sign in the right thalamic area. The size and location of the AVM prompted the decision for multistage endovascular embolization using onyx. In the anterior circulation, the right A5 arterial feeder has a high flow which indicates the pressure cooker technique embolization in the form of CAIT. In the procedure, early detachment and migration of the coil occurred in the medial prefrontal branch through the anterior cerebral artery. No intervention to retrieve the coil was carried out because the detachment piece is small and lodged distally. Onyx was injected directly without the coil because of the risk of radiation to the patient. Otherwise, the intraprocedural and postprocedural courses went uneventful. Conclusion: This is the first report of coil migration during the pressure cooker technique with CAIT for the right thalamic AVM.
The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreThis paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreImage compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
Research was: 1- known as self-efficacy when students perceived the university. 2- know the significance of statistical differences in perceived self-efficacy according to gender and specialty. Formed the research sample of (300) students were chosen from the original research community by way of random (150) male specialization and scientific and humanitarian (150) females specialized scientific and humanitarian. The search tool to prepare the yard tool to measure perceived self-efficacy based on measurements and previous literature on the subject of perceived self-efficacy. The researcher using a number of means, statistical, including test Altaúa and analysis of variance of bilateral and results showed the enjoyment of the research s
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreConstruction of photographed bullying scale of kindergarteners was the aim of this study. The study conducted to answer the raised question, could the bullying among kindergarteners be measured?. A total of (200) boy and girl were selected from city of Baghdad to be the sample of the study. The scale composed of (27) item with colored pictures. It takes about (15) minuets to answer the whole scale items. SPSS tools were used to process the collected data. The result showed that the bullying among kindergarteners could be measured.
Objectives: To identify child or family related risk factors for
unintentional childhood poisoning in Sulaymaniyah, Iraq and to suggest
possible causes and preventive measures.
Methods: This is an epidemiological description and a case-control study. The study was undertaken in Sulaymani ,in 2004-2005. Cases were 200 children who were admitted to the hospital for treatment of poisoning. For every case two controls were selected. Al l parents of the children were interviewed by using a questionnaire that incl uded demographic and poisoning characteristic information.<
... Show More