Preferred Language
Articles
/
DRckbY4BVTCNdQwCvEgL
Unilateral absence of the internal carotid artery associated with anterior communicating artery aneurysms: Systematic review and a proposed management algorithm
...Show More Authors
Background:

Absence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associated with Acom aneurysms and provide an illustrative case.

Methods:

We combined our experience of one case of a unilaterally absent ICA associated with an Acom aneurysm with the 33 existing publications on the same subject in the literature, for a total of 40 cases. We provide a detailed systematic literature review of this association of vascular anomalies, exploring different aspects regarding the collateral pathways and how they impact management strategies and propose a management algorithm to deal with such association.

Results:

The mean age was 48.2 ± 16.5 years. The aneurysmal rupture was the most common presentation (75%). Agenesis was observed in 70% of patients, followed by hypoplasia (20%) and, finally, aplasia (10%). Lie Type A was the most common pattern of collaterals (50%), with Types B and D being of almost equal proportions. Most aneurysms were located at the A1-Acom junction contralateral to the anomalous side (Fisher’s Exact test;P= 0.03). One case of temporary clipping was reported in the literature.

Conclusion:

Acom aneurysms in patients with unilateral ICA anomalies, given they are more commonly present contralaterally, could be of acquired etiology, warranting periodic screening in asymptomatic patients. Temporary clipping might be safe in patients with Type D collateral pattern, while those with Types A or B may require intraoperative rupture risk assessment and a tailored management plan to avoid disrupting collateral flow and causing ischemia.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 07 2021
Journal Name
Bioremediation Journal
Bioremediation of real-field slaughterhouse wastewater associated with power generation in algae-photosynthetic microbial fuel cell
...Show More Authors

View Publication
Crossref (8)
Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Bactericidal Effect of CO2 Laser on Bacteria Associated With Dental Implant Infection: An In Vitro Study
...Show More Authors

One of the most popular causes for implant infection is dental plaque bacteria. Previous studies have shown the bactericidal effect of CO2 laser irradiation on bacteria associated with soft tissue surrounding the implant materials. No published studies have examined the effect of irradiation by CO2 laser on Streptococcus oralis and Staphylococcus aureus.The aim of this study was to evaluate the bactericidal effect of CO2 laser on bacteria that are causing dental implant infections. This study was carried out on two isolates of bacterial species out of 25 samples, isolated from patients having soft tissue infections around the dental implant. These two pure isolates including Streptococcus oralis and Staphylococcus aureus were identified

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Pharmaceutical Negative Results
Evaluation Of Most Common Microorganisms Associated with Ectopic Pregnancy by Real Time PCR Among Iraqi Women
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 02 2016
Journal Name
Iraqi Postgraduate Medical Journal
Wallplasty Versus Non Wallplasty in Arthroscopically Assisted Anterior Cruciate Ligament Reconstruction
...Show More Authors

Abstract ABSTRACT:BACKGROUND: Anterior cruciate ligament reconstruction (ACLR) is one of the most commonly performed orthopedic procedures. Technical factors especially correct tunnel placement play major role in its success. However its failure rate is still high (10%), and impingement of the graft on the posterior cruciate ligament (PCL) and the medial wall of the lateral femoral condyle is an important cause of failure. Wallplasty is a technique used to prevent graft impingement, but there is no consensus on its routine use.OBJECTIVE:Is to compare between the postoperative knee functional outcome and stability of arthroscopic ACLR performed with wallplasty versus those performed without wallplasty.PATIENTS AND METHODS: A prospective exp

... Show More
Preview PDF