Purpose: We report a series of 29 pediatric patients who sustained head injuries due to metallic ceiling fans. They all were admitted to the Emergency Department of Neurosurgery Teaching Hospital in Baghdad, Iraq, during January 2015 to January 2017. Results: Pediatric ceiling fan head injuries are characterized by four traits which distinguish them from other types of head injuries; 1- Most of them were because of climbing on or jumping from furniture between the ages of two and five. 2- Most of them sustained compound depressed skull fracture which associated with intracranial lesions and pneumocephalus. 3- The most common indication for surgical intervention was because of dirty wound which mixed with hairs. 4- These variables were statistically significantly correlated with the outcome: Level of consciousness, neurologic deficit, fracture site (occipital fracture had worse outcome), intracranial hemorrhage and surgery. Conclusion: Pediatric metallic ceiling fan head injury should be seen as a distinct type of head injury because it has special presentations, managements, and outcomes. In addition, we should start applying preventive methods to minimize its occurrence.
Objectives: This study aims to determine the disease’s patterns and outcomes of admission among neonates hospitalized at the neonatal care unit in Erbil City, and using the findings as a baseline for neonate’s morbidity and mortality assessment in the future. Methodology: A retrospective study carried out at neonatal care unit of Raparin pediatric teaching hospital. An instrument for data collection developed by researcher included (age, gender, cause of admission, diagnosis and outcome upon discharge and causes of death). Content validity of the instrument was determined through the use of panel ex
Throughout what mentioned above, It is obvious that the aware narrator in these biography models was the strongest tool in presenting the content, especially the biographies under study were written by feminine hands, striving to prove her identity by all means and ways. In addition, we can suppose that the hiding of she writer behind the character is no more than a mask, by which she want to mask herself so that she can express herself frankly and freely, especially when she talks about subjects that are inconsistent with the society, customs and traditions. It is important to refer that the existence of the participant narrator in the biographies under study does not prevent the presence of another narrator such as external or aware na
... Show MoreBackground: One effective second-generation triptan for migraine attacks is sumatriptan. Following oral use, it has a 40% restricted bioavailability because of the first-pass metabolism. Aim: To develop the best intranasal Solusomes formula as a substitute that delivers into the brain directly, improving its bioavailability, and removing the first-pass outcome was the aim of this effort. Methodology: We developed solute formulations based on the Box-Behnken design and subsequently produced them via thin-film hydration. The quality by design technique was used to establish a correlation between the formulation parameters (Soluplus® and phosphatidylcholine (PC) concentrations) and signif¬icant quality powers (entrapment efficiency (
... Show MoreBN RASHİD, 2023
Infographics have the capability to organize and display information in a way that is easy for viewers to retrieve and make observations. While infographics have been successful in various fields, their potential benefits in composition writing have not been explored. The primary objective of this study is to investigate the perspectives of Iraqi EFL students who used infographics as an educational technology tool in composition writing, and to identify how gender influences students’ performance when using infographics in EFL writing classes. The significance of this study lies in its integration of infographics as an educational technology tool for teaching writing, aligning with the current trend of technology integration in educati
... Show MoreInformation from 54 Magnetic Resonance Imaging (MRI) brain tumor images (27 benign and 27 malignant) were collected and subjected to multilayer perceptron artificial neural network available on the well know software of IBM SPSS 17 (Statistical Package for the Social Sciences). After many attempts, automatic architecture was decided to be adopted in this research work. Thirteen shape and statistical characteristics of images were considered. The neural network revealed an 89.1 % of correct classification for the training sample and 100 % of correct classification for the test sample. The normalized importance of the considered characteristics showed that kurtosis accounted for 100 % which means that this variable has a substantial effect
... Show MoreThe research has designed for studying the relationship between manufacturing strategy and its flexibility under the flexible manufacturing system with their reflection on the competitive environmental performance of the firm. To interpret and tackle the problem, a hypothesis has formulated stating that “ the competitive performance of a firm is interpreted by the manufacturing strategy and flexibility which are derived from the firm and its business strategies under the flexible manufacturing system”. Related literatures with their theoretical dissertations, which enhanced the thoughtful content, have analyzed. An illustrative case study on the flexible manufacturing system at Toyota Motors Corporation working at the g
... Show MoreAcute lung injury (ALI) is a state of inflammation that breaks down the lung endothelial and epithelial cell barriers. In the current study, we investigated the role of resveratrol (RES) in regulating the expression and functions of tight junction proteins (TJP) in epithelial cell responses following exposure to this superantigen. To this end, C3H mice were given resveratrol orally twice prior to intranasal challenge with lethal SEB doses. 16S rRNA results showed that there were microbes transported in the blood in addition to the lung and colonic tissues. For this purpose, we used a reporter E. coli-GFP labeled bacterium to monitor and examine the viability of this bacterium in case
A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreTwo EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.