Preferred Language
Articles
/
BUJs15kBMeyNPGM3lLko
Incidence of Stenosis in Graft Renal Arteries Anastomosis in Kidney Transplantation Using Two Different Techniques
...Show More Authors

Summary Kidney transplantation is widely performed nowadays as an optimal treatment of end stage kidney diseases. Complications such as stenosis in graft renal arteries anastomosis may occur. Different suturing techniques are available for renal artery anastomosis. We aimed to compare the incidence of renal artery stenosis of the transplanted kidney when two suture techniques (continuous or interrupted) used for renal artery anastomosis. Therefore, a retrospectively comparative study was conducted on 44 patients managed with kidney transplantation during the years 2009-2011. Patients assigned into two groups; first group included 20 patients namely, continuous suture group, and the second group included 24 patients in whom the allograft arteries were anastomosed with an interrupted suture technique. Post transplantation, the velocity of blood flow in the renal and iliac arteries at the site of anastomosis was assessed using color duplex ultrasonography for the presence of graft renal artery stenosis. In each group only one case developed We graft renal artery stenosis with no statistically significant difference in the incidence rate. In conclusion, No difference in the incidence of graft renal artery stenosis in different anastomosis techniques. Other factors such as gentle handling of tissue, enough spatulation, margin eversion, and comparable diameter of the anastomosed vessels may be more important in the prevention of renal allograft stenosis than the type of suture technique used.

Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Physics: Conference Series
Measuring Urban Heat Island Indicators from Surface Temperature Using Spatial Techniques
...Show More Authors
Abstract<p>Using remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST </p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Oil spill classification based on satellite image using deep learning techniques
...Show More Authors

 An oil spill is a leakage of pipelines, vessels, oil rigs, or tankers that leads to the release of petroleum products into the marine environment or on land that happened naturally or due to human action, which resulted in severe damages and financial loss. Satellite imagery is one of the powerful tools currently utilized for capturing and getting vital information from the Earth's surface. But the complexity and the vast amount of data make it challenging and time-consuming for humans to process. However, with the advancement of deep learning techniques, the processes are now computerized for finding vital information using real-time satellite images. This paper applied three deep-learning algorithms for satellite image classification

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Sep 06 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
...Show More Authors

In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco

... Show More
View Publication
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Application of Weyl Module In The Case Of Two Rows
...Show More Authors

View Publication
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Cutaneous manifestations at saphenous vein harvest site among Iraqi patients with coronary artery bypass graft
...Show More Authors

KE Sharquie, AA Noaimi, AS Alaboudi, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 3

View Publication
Publication Date
Fri Feb 12 2016
Journal Name
International Journal Of Advanced Statistics And Probability
Two fixed point theorems in generalized metric spaces
...Show More Authors

<p>In this paper, we prove there exists a coupled fixed point for a set- valued contraction mapping defined on X× X , where X is incomplete ordered G-metric. Also, we prove the existence of a unique fixed point for single valued mapping with respect to implicit condition defined on a complete G- metric.</p>

View Publication
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
Role of calcium-regulating hormones, adipocytokines and renal function test in the progress of type 2 diabetes mellitus in a sample of Iraqi patients
...Show More Authors

A cross-sectional study was conducted on 80 type 2 diabetic patients aged 20-60 years in Baghdad and 20 non diabetic persons as controls. Laboratory assessment of glucose related parameters; Fasting blood sugar (FBS), Glycated hemoglobin (HbA1c), Insulin and Insulin resistance (IR), renal function test; Blood urea, serum creatinine, Calcium (Ca) and Phosphorus (P), Calcium regulating hormones; Parathyroid hormone (PTH), calcitonin and vitamin D, cytokines, Adiponectin and Tumor necrosis factor (TNF-α) and comparison these parameters between patients and controls. The results: a high significant (p˂0.01) increase in FBG level in the patients (211.34 ± 11.20 mg/dl) as compared with control (85.89 ± 3.07 mg/dl). A high significant (p˂0.01

... Show More
Preview PDF
Scopus (13)
Scopus