Preferred Language
Articles
/
IRhAiJQBVTCNdQwCMhzX
Using cryotherapy, <scp>EMLA</scp> (eutectic lidocaine/prilocaine) cream, or lidocaine spray to reduce pain during arteriovenous fistula puncture: A randomized controlled trial
...Show More Authors
Abstract<sec><title>Introduction

In hemodialysis patients, pain associated with needle insertion into an arteriovenous fistula is a physical and psychological problem. The aim of this study was to assess the effectiveness of pre‐puncture application of an ice pack, EMLA cream, or lidocaine spray to reduce pain associated with access puncture.

Methods

This was a multicenter study done in nine hemodialysis centers in Iraq. The study utilized a randomized, parallel‐group design, in which patients being dialyzed using an arteriovenous access were allocated into one of four groups. Access puncture was preceded by nothing (control group), by use of ice pack cooling at the puncture site, by application of EMLA cream, or by application of lidocaine spray. Pain after access puncture was assessed during a single treatment for each patient. Pain was quantified using a Visual Analogue Scale.

Findings

A total of 1548 patients agreed to participate, and 1041 patients were included in the data analysis. Use of an ice pack, EMLA cream, or lidocaine spray each was associated with a lower pain score on access puncture compared with no pretreatment. The mean Visual Analogue Scores in the four groups were: 69.7 ± 15.7 in the controls, 39.8 ± 13.2 in the ice pack group, 45 ± 18.4 in the EMLA group, and 52.9 ± 15.2 in lidocaine group. Ranking of the pain severity scores suggested that ice pack use was associated with the least pain, followed by use of EMLA cream and use of lidocaine spray (severity score ranking, from lowest to highest, being 1.62, 2.18, and 2.63, respectively).

Discussion

Application of an ice pack prior to vascular access puncture is a fast and inexpensive technique to limit pain associated with this procedure.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
Super-twisting based integral sliding mode control applied to a rotary flexible joint robot manipulator
...Show More Authors

In this paper, a single link flexible joint robot is used to evaluate a tracking trajectory control and vibration reduction by a super-twisting integral sliding mode (ST-ISMC). Normally, the system with joint flexibility has inevitably some uncertainties and external disturbances. In conventional sliding mode control, the robustness property is not guaranteed during the reaching phase. This disadvantage is addressed by applying ISMC that eliminates a reaching phase to ensure the robustness from the beginning of a process. To design this controller, the linear quadratic regulator (LQR) controller is first designed as the nominal control to decide a desired performance for both tracking and vibration responses. Subsequently, discontinuous con

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The effect of a counseling program to develop the skills of friendship among introverts children
...Show More Authors

Some children are suffering from introversion in kindergartens , so it must be confront and obviated by specialists because it will inevitably lead to unsatisfactory results reflect negatively on the individual and the community together . And the introvert child is a miserable child incapable of social interaction or give - and - take with colleagues , lack of integration of the child to life leads to the obstruction of  participation with his peers in various activities.     Introversion  causes a real emotional deficit to the children of kindergartens which limits of possibility of their intellectual development and mental growth and that because of their isolation and poor focus in education

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Dissertation/thesis
A Model To Evaluate the Online Training for Global Virtual Teams in Global Software Projects
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
Internet And Distributed Computing Systems
A Proposed Adaptive Rate Algorithm to Administrate the Video Buffer Occupancy for Smooth Video Streaming
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed program to audit the performance of the hotel sector under crises (Applied Research)
...Show More Authors

Abstract:

        The research sought to identify the crises that occurred during the research period and their reflection on the performance of the hotel Research sample as well as to identify the reality of auditing the hotel Research sample and the preparation of a performance audit program can be adopted in auditing the performance of hotels in light of crises, and the problem of the research lies in the lack of a program to audit the performance of hotels that takes into account the crises experienced by the hotel sector, The research was based on solving its problems on three hypotheses, the first is that the performance audit in light of the Covid-19 pand

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
What Bukhari shortened to a bug in its attribution: (Applied study in the correct mosque)
...Show More Authors

This study aims to show some of Imam Al-Bukhari's criticism of the Hadith from the Metn side, and part of his methodology in dealing with the correct hadiths that are tainted by a bug. This research focuses on what Imam Al-Bukhari summarized in his Sahih illusion of the narrator in his attribution, or uniqueness of the narrator, or to suggest a novel. We find that Bukhari sometimes abbreviates the hadeeth, and does not bring it out completely in his Sahih. He is satisfied with the abbreviated position but has done so because of a bug in it. The Bukhari usually does not declare his intention but knows this through tracking, inspection, and research of the correct hadiths.

View Publication Preview PDF
Publication Date
Tue Nov 18 2025
Journal Name
Al-mustansiriyah Journal Of Science
Epidemiological Study to Investigate a Possible Vector of Visceral Leishmaniasisin the Central Region of Iraq
...Show More Authors

An epidemiological study in Al-Mahmmodiya (50 km south Baghdad) to investigate a possible vector of Leishmaniasis were applied .This region is considered as a foci of Leishmaniasisaccording to the health association statistics. CDC light traps were used to collect the insects nightly. Insects were collected by Indoor application as human dwellings and animal shelters and Outdoor application as rodent's barrows and field trees. Sand flies were transported to the laboratory, isolated and identified according to the identification keys in Tropical Biological Researches Unit at the Collage of Science / University of Baghdad. Must of the collected sand flies were belonging to three species PhlebotomuspapatasiScopoli(45%), PhlebotomusalexandriSin

... Show More
View Publication
Publication Date
Tue Nov 18 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Maximum bite force among a group of Iraqi children in relation to mandibular growth rotation
...Show More Authors

View Publication
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Design and Construction of a Testing Platform and Estimating Attenuation Painting Reflectivity to Laser Beam
...Show More Authors

The project has been described the design and construction of a reliable optical testing platform used for evaluate the reflectivity of metal surfaces treated with special paintings required for laser beam attenuation. The platform comprises an Nd-YAG laser system which has been designed and fabricated with specifications to be compatible with their corresponding in laser range finder transmitters used for various applications. The reflectivity of various attenuating paintings, at different detection angles, has been observed. Moreover, the variation of the reflected energy with painting type and metal type to be painted has been studied experimentally. Results illustrated the existence of a definite angle, at which the reflectivity was max

... Show More
View Publication Preview PDF
Crossref