BACKGROUND: Cochlear implant has become a routine procedure for management of severe sensorineural hearing loss. Cochlear implant extrusion is one of the most devastating complication of this procedure. A double layer closure of pericranial flap and scalp rotational flap has being showed to decrease the rate of late implant extrusion.OBJECTIVE:The purpose of this study is to evaluate the use of the pericranial flap as second layer coverage after cochlear implant extrusion.PATIENTS AND METHODS:Eight patients with cochlear implant extrusion in Al-Shaheed Gazi Al-Hariri hospital were operated on by using two layer closure ; the pericranial flap as salvage layer used to cover the cochlear implant and scalp rotational flap as a routine coverage, with mean postoperative follow- up period of 6 months.RESULTS: Eight patients with late cochlear implant extrusion where operated on by using double layers closure, seven of them had no evidence of extrusion during the 6 months follow-up period. No complications were notice apart from one case who developed flap necrosis and the implant was removed later on, and another patient who had postoperative hematoma, which was surgically evacuated and the flap healed uneventfully. The results show that using pericranila flap as salvage second layer coverage in patients with cochlear implant extrusion had significant role in prevention of secondary cochlear implant extrusion. CONCLUSION: We concluded that the use of combination of pericranial flap as first layer with scalp rotational flap as secondary coverage of implant had superior result in prevention of secondary cochlear implant extrusion.
In this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).
This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More