Preferred Language
Articles
/
DRckbY4BVTCNdQwCvEgL
Unilateral absence of the internal carotid artery associated with anterior communicating artery aneurysms: Systematic review and a proposed management algorithm
...Show More Authors
Background:

Absence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associated with Acom aneurysms and provide an illustrative case.

Methods:

We combined our experience of one case of a unilaterally absent ICA associated with an Acom aneurysm with the 33 existing publications on the same subject in the literature, for a total of 40 cases. We provide a detailed systematic literature review of this association of vascular anomalies, exploring different aspects regarding the collateral pathways and how they impact management strategies and propose a management algorithm to deal with such association.

Results:

The mean age was 48.2 ± 16.5 years. The aneurysmal rupture was the most common presentation (75%). Agenesis was observed in 70% of patients, followed by hypoplasia (20%) and, finally, aplasia (10%). Lie Type A was the most common pattern of collaterals (50%), with Types B and D being of almost equal proportions. Most aneurysms were located at the A1-Acom junction contralateral to the anomalous side (Fisher’s Exact test;P= 0.03). One case of temporary clipping was reported in the literature.

Conclusion:

Acom aneurysms in patients with unilateral ICA anomalies, given they are more commonly present contralaterally, could be of acquired etiology, warranting periodic screening in asymptomatic patients. Temporary clipping might be safe in patients with Type D collateral pattern, while those with Types A or B may require intraoperative rupture risk assessment and a tailored management plan to avoid disrupting collateral flow and causing ischemia.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 09 2019
Journal Name
Journal Of Global Pharma Technology
Biological Activity Study of Schiff Base ligands and their Complexes: A Review
...Show More Authors

Schiff bases (SBs) based on amino acid derivative stand for multipurpose ligands that formed by condensing amino acids with carbonyl groups. They are significant in pharmaceutical and medical areas due to their widespread biological actions such as antiseptic, antifungal, along with antitumor actions. Transition metallic complexes resulting from SB ligands with biological activity were extensively experimented in the literature. In this article, we review, in details, about synthesizing and biological performances of SBs along with its complexes.

Publication Date
Wed Dec 20 2023
Journal Name
Al-esraa University College Journal For Medical Sciences
Nanoparticles Used in Treatment and Diagnosis of Leishmaniasis in Iraq: A Review
...Show More Authors

The aim of this paper is to identify Nano-particles that have been used in diagnosis and treatment of leishmaniasis in Iraq. All experiments conducted in this field were based on the following nanoparticles: gold nanoparticles, silver nanoparticles, zinc nanoparticles, and sodium chloride nanoparticles. Most of these experiments were reviewed in terms of differences in the concentrations of nanoparticles and the method that was used in the experiments whether it was in vivo or in vitro. These particles used in most experiments succeeded in inhibiting the growth of Leishmania parasites.

View Publication
Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
A Proposed Strategy to Develop Postgraduate Studies at King Khalid University to Support the Achievement of the Kingdom's 2030 Vision
...Show More Authors

Abstract

The aim of this research is to formulate a proposed strategy for developing graduate studies at King Khalid University to support the achievement of the Kingdom's vision (2030). The research used the descriptive survey approach. The research community consisted of all graduate students at King Khalid University. The research was conducted on a random sample included (623) Male and female students, this research relied on the questionnaire as the main tool for collecting its data. The results revealed that the research sample believes that all the proposals included in this research are very important for the development of postgraduate studies at King Khalid University to support the achievement of the K

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Internal music in the poetry of guidance In the era of Islam and its effects Artistic and semantic
...Show More Authors

In this research entitled "Internal music in the poetry of guidance in the era of Islam and its artistic and semantic implications" dealt with the following:
 Preface, which addressed the importance of internal music in poetry, and its close association with poetry, and the poet himself, to reveal what is touring himself and revolves in his imagination.
 Repetition of all kinds: repetition of letters, repetition of words, and repetition of phrases: It showed what this repetition of strengthening the melody, and linking parts of words within the same house, or the poem, and create a special musical atmosphere to spread a certain significance and to confirm the meanings and accompanied by musical accommodation.
 Anaphysic

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Review of the Some Fixed Point Theorems for Different Kinds of Maps
...Show More Authors

The focus of this article, reviewed a generalized  of contraction mapping and nonexpansive maps and recall some theorems about the existence and uniqueness of common fixed point and coincidence fixed-point for such maps under some conditions. Moreover, some schemes of different types as one-step schemes ,two-step schemes and three step schemes (Mann scheme algorithm, Ishukawa scheme algorithm, noor scheme algorithm, .scheme algorithm,  scheme algorithm Modified  scheme algorithm arahan scheme algorithm and others. The convergence of these schemes has been studied .On the other hands, We also reviewed the convergence, valence and stability theories of different types of near-plots in convex metric space.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (5)
Crossref (1)
Scopus Crossref