Preferred Language
Articles
/
6BcEfY4BVTCNdQwCZUo4
Impact of dome projection on operative steps during clipping of a ruptured pure posteriorly directed posterior communicating artery aneurysms
...Show More Authors

Background: Ruptured posterior communicating artery (PCoA) aneurysms are common; they usually present with subarachnoid haemorrhage (SAH) and oculomotor nerve palsy. The aneurysmal dome projection may influence the safety access and aneurysmal neck clipping. Here, we discuss additional intraoperative steps that may be required to widen the surgical field to ensure safe surgical clipping of a rupture pure posteriorly directed PCoA aneurysm. Case description: A previously healthy 38-year-old male reported sudden severe headache and disturbed level of consciousness with a Glasgow coma scale (GCS) of 13. His initial computed tomography (CT) scan of the head showed SAH in the basal cistern. 3D-constructed CT angiography (CTA) revealed a left pure posteriorly directed PCoA aneurysm. In the surgery, through the left pterional approach, all intraoperative steps were carried out. Additional steps were performed as well. Three additional intraoperative steps were contemplated because a pure posteriorly directed PCoA aneurysm is not well appreciated and is often hidden behind the supra cliniold internal carotid artery (ICA). First, the extension of Sylvian fissure dissection to include the distal part and the proximal. Second, temporal pole mobilization is performed by cutting small anterior temporal veins. Third, a brain retractor is placed on the temporal lobe to gently tract the superficial part of the lobe. All these steps widened the surgical corridor to ensure the aneurysm's safe clipping. Conclusion: Surgical clipping is influenced by the aneurysmal dome projection. In a ruptured pure posteriorly directed PCoA aneurysm, further intraoperative steps may facilitate complete access and safe clipping of the aneurysm.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
Controls Scanning on the slippers: a study fiqhiat Comparison
...Show More Authors

 

 

Controls Scanning on the slippers a study fiqhiat Comparison

The subject of this research is an important topic, which is frequently repeated, and people need to know its wisdom, and has made it in front and the preface and three detectives, showed through discussion the meaning of the survey on the socks, its wisdom, its rules and conditions, and the duration of the survey on it, spoiled and reasoned and compared to the doctrinal doctrines, And the most correct statement of words I have concluded with a number of things, as follows:

  1. The need to ensure that the slippers are clean, visible and inwa

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2015
Journal Name
Journal Of Intelligent & Fuzzy Systems
A note on “separation axioms in fuzzy bitopological spaces”
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A New Separable Moments Based on Tchebichef-Krawtchouk Polynomials
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Italian Journal Of Pure And Applied Mathematics
A note on s-acts and bounded linear operators
...Show More Authors

Scopus (1)
Scopus
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref