Preferred Language
Articles
/
DRckbY4BVTCNdQwCvEgL
Unilateral absence of the internal carotid artery associated with anterior communicating artery aneurysms: Systematic review and a proposed management algorithm
...Show More Authors
Background:

Absence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associated with Acom aneurysms and provide an illustrative case.

Methods:

We combined our experience of one case of a unilaterally absent ICA associated with an Acom aneurysm with the 33 existing publications on the same subject in the literature, for a total of 40 cases. We provide a detailed systematic literature review of this association of vascular anomalies, exploring different aspects regarding the collateral pathways and how they impact management strategies and propose a management algorithm to deal with such association.

Results:

The mean age was 48.2 ± 16.5 years. The aneurysmal rupture was the most common presentation (75%). Agenesis was observed in 70% of patients, followed by hypoplasia (20%) and, finally, aplasia (10%). Lie Type A was the most common pattern of collaterals (50%), with Types B and D being of almost equal proportions. Most aneurysms were located at the A1-Acom junction contralateral to the anomalous side (Fisher’s Exact test;P= 0.03). One case of temporary clipping was reported in the literature.

Conclusion:

Acom aneurysms in patients with unilateral ICA anomalies, given they are more commonly present contralaterally, could be of acquired etiology, warranting periodic screening in asymptomatic patients. Temporary clipping might be safe in patients with Type D collateral pattern, while those with Types A or B may require intraoperative rupture risk assessment and a tailored management plan to avoid disrupting collateral flow and causing ischemia.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Internal music in the poetry of guidance In the era of Islam and its effects Artistic and semantic
...Show More Authors

In this research entitled "Internal music in the poetry of guidance in the era of Islam and its artistic and semantic implications" dealt with the following:
 Preface, which addressed the importance of internal music in poetry, and its close association with poetry, and the poet himself, to reveal what is touring himself and revolves in his imagination.
 Repetition of all kinds: repetition of letters, repetition of words, and repetition of phrases: It showed what this repetition of strengthening the melody, and linking parts of words within the same house, or the poem, and create a special musical atmosphere to spread a certain significance and to confirm the meanings and accompanied by musical accommodation.
 Anaphysic

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Process Safety And Environmental Protection
Safety and health management response to COVID-19 in the construction industry: A perspective of fieldworkers
...Show More Authors

View Publication
Scopus (54)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Proposed Strategy to Develop Postgraduate Studies at King Khalid University to Support the Achievement of the Kingdom's 2030 Vision
...Show More Authors

Abstract

The aim of this research is to formulate a proposed strategy for developing graduate studies at King Khalid University to support the achievement of the Kingdom's vision (2030). The research used the descriptive survey approach. The research community consisted of all graduate students at King Khalid University. The research was conducted on a random sample included (623) Male and female students, this research relied on the questionnaire as the main tool for collecting its data. The results revealed that the research sample believes that all the proposals included in this research are very important for the development of postgraduate studies at King Khalid University to support the achievement of the K

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Tikrit Journal For Dental Sciences
Enamel White Spot Lesions: A Review of Etiology, Prevention, and Treatment
...Show More Authors

Enamel White Spot Lesions (EWSLs) are a common dental condition characterized by being opaque or chalky white in appearance. In this review, an overview of the etiology, prevention, and treatment techniques for EWSLs is presented. Enamel demineralization caused by bacteria in dental plaque which releases acids upon the consumption of fermentable carbohydrates causing mineral loss is thought to be the main cause of those lesions, which could be predisposed through orthodontic treatment, poor diet, inadequate oral hygiene and certain medical conditions. So, sustaining an adequate carbohydrate consumption, proper fluoride exposure and good oral hygiene are some of the practices which aid in these lesions’ prevention. Although the suc

... Show More
View Publication Preview PDF
Crossref