Preferred Language
Articles
/
PheU-o0BVTCNdQwCaiuF
Endoscopic Partial Lateral Middle Turbinectomy versus middle Turbinat Trimming in Adult patients with Concha Bullosa
...Show More Authors

Background: Concha bullosa is an anatomical variation which defined by pneumatizaton of middle turbinate that occurred with an incidence of (5 to 25%) in the normal population.It has the potential to cause crowding and obstruction of the middle meatus and nasal cavity. There are many surgical techniques which utilized for its management. Study goal: Is to compare the formation of adhesion between endoscopic partial lateral middle turbinectomy and middle turbinate trimming in cases of concha bullosa. Patients and methods: A prospectivecomparative clinical trial was performed in the ENT department at Al-Shahid Ghazi AL Hariri Hospital in Medical City over the period from September 2016 to August 2017. Fifty nine (59) patients {24 males & 35 females} complained from long-standing history of unilateral or bilateral nasal obstruction (without signs of allergy, nasal polyps or masses) was included in this study. CT scan of nose and para-nasal sinuses revealed twenty one (21) patients had unilateral concha bullosa while thirty eight (38) of them had bilateral concha bullosa. The patients were divided randomly, into two groups regarding the type of endoscopic surgical management of concha bullosa (partial lateral middle turbinectomy versus trimming of middle turbinate). Patients were followed-up every 2 weeks for three months postoperatively (subjective assessment of the nasal airway patency and endoscopic nasal examination looking for any adhesion to lateral nasal wall). Results: The percentage of adhesion was (23.4%) in partial lateral middle turbinectomy and was (8%) in trimming of middle turbinate while the relief of nasal obstruction was (96.8%) after middle turbinate trimming and was (82.1%) after partial lateral middle turbinectomy. Conclusions: The adhesion was more statistically significant in partial lateral middle turbinectomy than middle turbinate trimming with (P value = 0.036) and the nasal airway patency improvement was more statistically significant after middle turbinate trimming than partiallateral middle turbinectomy with (P value = 0.027).

Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Assured Data Deletion Security Techniques in Cloud Storage
...Show More Authors

      Cloud computing is an interesting technology that allows customers to have convenient, on-demand network connectivity based on their needs with minimal maintenance and contact between cloud providers. The issue of security has arisen as a serious concern, particularly in the case of cloud computing, where data is stored and accessible via the Internet from a third-party storage system. It is critical to ensure that data is only accessible to the appropriate individuals and that it is not stored in third-party locations. Because third-party services frequently make backup copies of uploaded data for security reasons, removing the data the owner submits does not guarantee the removal of the data from the cloud. Cloud data storag

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Randomness of Stream Cipher Digital Sequences in the Field GF(28)
...Show More Authors

     A binary stream cipher cryptosystem can be used to encrypt/decrypt many types of digital files, especially those can be considered huge data files like images. To guarantee that the encryption or decryption processes need a reasonable time to encrypt/decrypt the images, so we have to make the stream cipher key generator that acts quickly without effect in the complexity or randomness of the output key binary sequences. In this paper, we increase the size of the output sequence from binary to digital sequence in the field  to obtain byte sequence, then we test this new sequence not only as binary but also -sequence. So we have to test the new output sequence in the new mathematical field. This is done by changing the base of the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 24 2020
Journal Name
Journal Of Engineering
Using Steel Slag for Stabilizing Clayey Soil in Sulaimani City-Iraq
...Show More Authors

The clayey soils have the capability to swell and shrink with the variation in moisture content. Soil stabilization is a well-known technique, which is implemented to improve the geotechnical properties of soils. The massive quantities of waste materials are resulting from modern industry methods create disposal hazards in addition to environmental problems. The steel industry has a waste that can be used with low strength and weak engineering properties soils. This study is carried out to evaluate the effect of steel slag (SS) as a by-product of the geotechnical properties of clayey soil. A series of laboratory tests were conducted on natural and stabilized soils. SS was added by 0, 2.5, 5, 10, 15, and 20% to the soil.

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Advances In Animal And Veterinary Sciences
Gentamicin enhances toxA expression in Pseudomonas aeruginosa isolated form cow mastitis
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Generalized closed fuzzy soft sets in Čech fuzzy soft closure spaces
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Jul 28 2022
Journal Name
Mechanics Based Design Of Structures And Machines
Experimental investigation on the damping characteristics in dry and saturated sands
...Show More Authors

Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jul 05 2023
Journal Name
Journal Of Pragmatics Research
Analysis of Impoliteness Strategies Used in Putin's Speech at Annexation Ceremony
...Show More Authors

This study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Role Of ψ-Operator in the Study of Minimal Open Sets
...Show More Authors

     The operator ψ has been introduced as an associated set-valued set function. Although it has importance for the study of minimal open sets as well as minimal I-open sets. As a result of this study, we introduce minimal I^*-open sets . In this study, several characterizations of minimal I^*-open sets are also investigated. This study also discusses the role of minimal  I^*-open sets in the *-locally finite spaces. In an aspect of topological invariant, the homeomorphic images of minimal I^*-open set has been discussed here.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Civil Engineering Journal
Measuring of Subjective and Objective Aesthetics in Planning and Urban Design
...Show More Authors

The article includes the concept of aesthetics through what has been dealt with in the literature by philosophers and researchers who have addressed this concept in an attempt to derive indicators of aesthetics. The article adopted a descriptive and analytical methodology by reviewing recent literature on the concept of aesthetics and its relation to urban planning and design issues. Many subjective and objective aesthetics indicators have been identified, some of which are classified under real aesthetics, and some under fake aesthetics. The indicators were applied to the Kufa Mosque complex and Sahla Mosque complex as a comparative case study. It was found that the indicators of real aesthetics have a higher weight in determining

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref