Preferred Language
Articles
/
bBiLWZcBVTCNdQwCsZf-
Neonatal Seizure in a Tertiary Center Work
...Show More Authors

Background: Neonatal seizures are the most common neurological emergency in newborns, often associated with significant mortality and long-term neurodevelopmental disabilities. The aim is to determine the incidence, etiological causes, and risk factors associated with neonatal seizures.Patients and Methods: This prospective case-control study was conducted over eight months, from January 1 to August 31, 2022, the study was conducted at the neonatal care unit of Children Welfare Teaching Hospital. Neonates who developed clinically recognizable seizures before 28 days of life in term infants, or up to 44 weeks corrected gestational age in preterm infants, were included. Data collection involved demographic information, prenatal, perinatal, and postnatal history, family history, seizure characteristics, physical examination including growth parameters, and relevant laboratory and radiological investigations. Follow-up was conducted two months later via phone interviews.Results: Among 180 neonates included, 50% had seizures while the remaining served as controls. The incidence of seizures among admitted neonates was 7.7%. The three main etiologies were birth asphyxia, infection, and metabolic disorders, each accounting for 25.6% of cases. The mean age at seizure onset was 9.3 ± 9.1 days, with a median of 5 days. Males were more affected (male-to-female ratio 1.57:1), and seizures were more common in term infants. Significant associations were found with family history of neurological disease and neonatal death. Vaginal delivery was more linked to birth asphyxia, while cesarean delivery was associated with neurological malformations. Mortality was three times higher in neonates with seizures.Conclusion: Birth asphyxia, infection, and metabolic disorders are leading causes of neonatal seizures. A positive family history and prematurity increase susceptibility. Early onset may indicate etiology, but seizure type does not predict cause. Seizure presence significantly increases neonatal mortality.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 29 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Image Fusion Techniques: A Review
...Show More Authors

Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH

... Show More
Publication Date
Wed Sep 15 2021
Journal Name
Journal Of Baghdad College Of Dentistry
Diet and orthodontics- A review
...Show More Authors

During the course of fixed orthodontic therapy, patients should be instructed to eat specific food stuffs and beverages in order to maintain good health for the dentition and supporting structures and prevent frequent attachment debonding that prolong the treatment duration. After searching and collecting articles from 1930 till July 2021, the current review was prepared to emphasize various types of foods that should be taken during the course of fixed orthodontic therapy and to explain the effect of various food stuffs and beverages on the growth and development of craniofacial structures, tooth surfaces, root resorption, tooth movement, retention and stability after orthodontic treatment and the effect on the components of fixed ortho

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Space of Fuzzy Orderings
...Show More Authors

In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group  (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of  (A). 2.  an element e  A such that (e) = – 1    X. 3. X :={a  A\ (a) = 1    X} = 1. 4. If f and g are forms over A and if x  D(

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
(دراسة تحليلية): ( A field study )
...Show More Authors

The research aimed to identify the effects of the modern of technology on translating the media term from English language to Arabic. and try to identify the use of the impact of foreign media terminologies on the Arabic media term, and to know the effect of the translation process on Arabic media terminologies.

This research is considered an analytical study by using survey study for 111 items and the results for the study as following:

1.High percentage of the (use of foreign terms work to low the level of production) was (68.13%) and average 3.55

2.The percentage of (The multiplicity of translation of the foreign term into Arabic effects on the opinions and cognitive ideas of the Arab researcher and affects the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Steganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography

View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Part-a-san-francisco-abstracts2019,acs
Part-A-San-Francisco-abstracts
...Show More Authors

Synthesis and study liquid crystalline properties of novel Benzimidazol-8-hydroxyquinoline complexes by reaction of a-Chloro acetic acid with 3,3'-dimethylbiphenyl-4,4'-diamine in 10% aqueous sodium hydroxide to synthesized compound [I] then the later compound reacted with o-phenylenediamine in 4N Hydrochloric acid to synthesized compound N4,N4'-bis((1H-benzo[d]imidazol-2-yl)methyl)-3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine =[II] . While the complexes [III],[IV],[V],[VI] and [VII] synthesized from reacted compound [II] , 8-hydroxyquinoline with metal(II) salts { M= Mn(II), Fe(II), Ni (II), Cu(II),and Zn(II)}. Newly synthesized compounds were characterized using melting points, FT-IR, UV-Vis spectra, and some of them 1H NMR spectroscopy. ma

... Show More
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Nature as a holy book
...Show More Authors

Nature and natural beauty have always been the source of inspiration for poets and mystics.  For them, nature is one of the most recurrent and celebrated themes. It is a significant symbol of the beauty, righteousness and freshness they are looking for. For religious and mystical poets, it is a reference to God, his beauty, and splendour. Comparing it with the scripture, Thomas Ryan, a Catholic priest and a mystical writer, says ''The Bible is the 'small book', the world of nature is the 'big book'. Both reveal the Creator.''1

     For Muslim mystics, God does exist everywhere as the Qur'an states:   ''Wherever (Whithersoever)  you turn, there is God's face” (Chapter (Surah): 2

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
A Combinatorial Approach to Obtain the Yield Probability Distribution along a Linearly-Loaded Cantilever Beam
...Show More Authors

The substantial key to initiate an explicit statistical formula for a physically specified continua is to consider a derivative expression, in order to identify the definitive configuration of the continua itself. Moreover, this statistical formula is to reflect the whole distribution of the formula of which the considered continua is the most likely to be dependent. However, a somewhat mathematically and physically tedious path to arrive at the required statistical formula is needed. The procedure in the present research is to establish, modify, and implement an optimized amalgamation between Airy stress function for elastically-deformed media and the multi-canonical joint probability density functions for multivariate distribution complet

... Show More
View Publication Preview PDF
Crossref