Preferred Language
Articles
/
6BcEfY4BVTCNdQwCZUo4
Impact of dome projection on operative steps during clipping of a ruptured pure posteriorly directed posterior communicating artery aneurysms
...Show More Authors

Background: Ruptured posterior communicating artery (PCoA) aneurysms are common; they usually present with subarachnoid haemorrhage (SAH) and oculomotor nerve palsy. The aneurysmal dome projection may influence the safety access and aneurysmal neck clipping. Here, we discuss additional intraoperative steps that may be required to widen the surgical field to ensure safe surgical clipping of a rupture pure posteriorly directed PCoA aneurysm. Case description: A previously healthy 38-year-old male reported sudden severe headache and disturbed level of consciousness with a Glasgow coma scale (GCS) of 13. His initial computed tomography (CT) scan of the head showed SAH in the basal cistern. 3D-constructed CT angiography (CTA) revealed a left pure posteriorly directed PCoA aneurysm. In the surgery, through the left pterional approach, all intraoperative steps were carried out. Additional steps were performed as well. Three additional intraoperative steps were contemplated because a pure posteriorly directed PCoA aneurysm is not well appreciated and is often hidden behind the supra cliniold internal carotid artery (ICA). First, the extension of Sylvian fissure dissection to include the distal part and the proximal. Second, temporal pole mobilization is performed by cutting small anterior temporal veins. Third, a brain retractor is placed on the temporal lobe to gently tract the superficial part of the lobe. All these steps widened the surgical corridor to ensure the aneurysm's safe clipping. Conclusion: Surgical clipping is influenced by the aneurysmal dome projection. In a ruptured pure posteriorly directed PCoA aneurysm, further intraoperative steps may facilitate complete access and safe clipping of the aneurysm.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Using a New Modification on Wind Turbine Ventilator for Improving Indoor Air Quality
...Show More Authors

This paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Geopolitical dimensions to build a dam on the downstream Renaissance (Egypt and Sudan)
...Show More Authors

Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of electronic banking transactions to increase the net revenue of the Bank of paypal in United States of America for Period ( 2010-2016 )
...Show More Authors

Abstract

   It is clear to everyone how important it is to implement transactions electronically, as it facilitates the provision of services to beneficiaries, whether individuals or institutions, to achieve many benefits that are not exclusive to the beneficiary or the applicant, but extends to the governmental and international bodies. And the number of users has reached millions since its emergence in 1995, because the concepts of electronic transactions have great advantages for the economy in general and the banking sector in particular, so cooperation in various fields with the aim of becoming an information society has become paramount, It allows customers to pay money to any company they want t

... Show More
View Publication Preview PDF
Crossref