(1) Background: Sleeping disorders are frequently reported following traumatic brain injury (TBI). Different forms of sleeping disorders have been reported, such as sleepiness, insomnia, changes in sleeping latency, and others. (2) Methods: A case-control study with 62 patients who were victims of mild or moderate TBI with previous admissions to Iraqi tertiary neurosurgical centers were enrolled as the first group, and 158 patients with no history of trauma were considered as the control. All were 18 years of age or older, and the severity of the trauma and sleep disorders was assessed. The Pittsburgh sleep quality index was used to assess sleep disorders with average need for sleep per day and average sleep latency were assessed in both groups. Chi-square and t-test calculations were used to compare different variables. (3) Results: 39 patients (24.7%) of the controlled group experienced sleeping disorders compared to TBI group with 45 patients (72.6%), P-value < 0.00001. A total of 42 patients were diagnosed on admission as having a mild degree of TBI (mean GCS 13.22 ± 1.76) and 20 patients were diagnosed with moderate TBI (mean GCS11.05 ± 1.14. 27). A total of 27 (46.28%) patients with mild severity TBI and 18 patients (90%) of moderate severity were considered to experience sleeping disorders, P-value 0.0339. Each of the mild and moderate TBI subgroups show a P-value < 0.00001 compared to the control group. Average sleep hours needed per day for TBI and the control were 8.02 ± 1.04 h and 7.26 ± 0.58 h, respectively, P-value < 0.00001. Average sleep latency for the TBI and the control groups were 13.32 ± 3.16 min and 13.93 ± 3.07 min respectively, P-value 0.065. (4) Conclusion: Sleep disturbances are more common following mild and moderate TBI three months after the injury with more hours needed for sleep per day and no significant difference in sleep latency. Sleep disturbances increase in frequency with the increase in the severity of TBI.
Background: Penetrating Neck Injuries (PNI) management represents a challenge to most surgeons in civilian trauma, in weighing selective versus mandatory exploration of all cases in different circumstances. Data are encouraging surgeons to adopt the former approach.Objectives: The study aims to assess the selective approach in our war and terror time events in Al-Yarmouk teaching hospital.Type of the study:A retrospective study. Methods: Data of patients presented to the Thoracic and Vascular ward in Al-Yarmouk teaching hospital with PNI were assessed retrospectively, from March 2013 to March 2015, and analyzed for epidemiology, mechanism of trauma, management methods, associated organ injuries, complications and mortality. Results: Amon
... Show MoreObjectives: to evaluate the role of conservative, decompression, spine fixation in management of closed spinal injury.
Methods: The study was conducted at Specialized Surgical hospital and Al-Kadhemayia Teaching Hospital, in the period between July 2003 and July 2005.The study included 61 patients categorized Into many groups according level of vertebral injury (cervical, cervicodorsal, dorsal, dorsolumbar, Lumbar and lumbosacral), type of injury (compressed fracture, burst fracture and fracture dislocation) And according the severity into three groups as G1( complete motor paralysis and sensory loss ) G2 ( complete motor paralysis and incomplete sensory loss) and G3 ( incomplete motor paralysis And incomplete sensory loss ).The metho
This study was aimed to investigate the association between thyroid disorder and Helicobacter pylori infection in 122 patients (100 females and 22 males )and for comparison, 60 healthy individuals (31females and 29 males),who had no thyroid disorder, were also included in the study. Blood samples were collected from both patients and the healthier individuals. Enzyme Linked Fluorescent Assay (ELFA) technique through using Vitek Immuno Diagnostic Assay System (VIDAS) was applied to measure levels of the thyroid hormones (tri-iodothyronine T3, tetra-iodothyroxine T4) and thyroid stimulating hormone (TSH). From the results obtained, patients were classified into three groups: 40 were
... Show MoreRecent population studies have shown that placenta accreta spectrum (PAS) disorders remain undiagnosed before delivery in half to two-thirds of cases. In a series from specialist diagnostic units in the USA, around one-third of cases of PAS disorders were not diagnosed during pregnancy. Maternal
The current research aims to identify the fear of intimacy and post-traumatic stress disorder among Yazidi women and the correlation between them. To achieve the objectives of the research, the researcher adopted the Descutner, 1991 & (Thelen) scale, which consisted of (35) items. The researcher also adopted the post-traumatic stress disorder scale for (Davidson, 1995) translated by (Abdul Aziz Thabet), which consists of (17) items. These two scales were administered to a sample of (200) individuals. Then, the researcher analyzes the data using the Statistical Package for Social Sciences (SPSS). The results showed that the research sample of Yazidi women has a fear of intimacy. The research sample of Yazidi women is characterized by
... Show MoreObjective(s): The present study aims at studying the relationship between immunoglobulin IgG, IgA,
IgM , as well as to C-3 and C-4 in brain tumours patients immunity (meningioms and gliomas).
Methodology: Forty sera of brain tumour patients were included 20 glioma and 20 meningioma was
tested to determine the levels of IgM, IgG IgA, C-3 and C-4 by using single radial immune-diffusion
technique and compared with 20 apparently healthy blood donors.
Results: The study revealed a significant decreasing in IgG levels in glioma as compare to meningioma
and control. The concentration of two other serum immunoglobulins and complement in both
meningioma and glioma show no significant differences with those in control group.
A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreThe current research aims at detecting Brain Dominance Learning Styles distinguished
and ordinary secondary school students (males and females).The researcher adopted Torrance
measure, known as ‘the style of your learning and thinking to measure Brain Dominance
Learning Styles’, the codified version of Joseph Qitami (1986); picture (a). The researcher
verified the standard properties of tool. The final application sample was 352 distinguished
and ordinary students; 176 distinguished male and female students and 176 ordinary male and
female students at the scientific fifth level of secondary school from schools in the province of
Baghdad, AL- KarKh Education Directorates in the First and Second . and who have been
The Almighty Allah has addressed His followers by advising them to follow the example of the prophet (PBUH). Allah says: (INDEED IN THE MESSENGER OF ALLAH YOU HAVE A GOOD EXAMPLE TO FOLLOW). So, He was a true and everlasting example for the people to follow and imitate in all aspects of life. Knowledge and learning, especially Qura'nic knowledge, are among the priorities.
The present study is concerned with how to follow the Prophet example (PBUH) in the field of Qur'an reciting. It aims at showing His instructions on Qur'an reciting, and how He was followed by His Companions. The present study falls into an introduction and four sections. Section One deals with the commands given by Allah to follow His prophet. Second Two
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show More