Preferred Language
Articles
/
exfzfI4BVTCNdQwCMkqN
Ruptured giant aneurysm of a cortical middle cerebral artery: A case report
...Show More Authors
Background:

Aneurysms of the cortical branches of the middle cerebral artery (MCA) are rare. They usually are secondary to traumatic or infectious etiologies and are rarely idiopathic. The specific characteristics of idiopathic aneurysms in such location are not well defined in the literature. The authors report a rare case of a ruptured giant idiopathic cortical MCA aneurysm with review of the available literature on this clinical entity.

Case Description:

A 24-year-old female presented with headache, disturbed level of consciousness, and right-sided weakness. Imaging studies showed a left frontoparietal intracerebral hematoma and a giant saccular aneurysm in the posterior parietal cortical branch of the MCA. The patient had no history of head trauma or active infection; therefore, the aneurysm was considered idiopathic. A microsurgical clipping of the aneurysm with evacuation of the hematoma was performed. There were no surgical complications, and the patient achieved a good outcome modified Rankin Scale of 1 with no neurological deficits.

Conclusion:

Idiopathic aneurysms of the cortical branches of the MCA are rare, and usually present with intraparenchymal hemorrhage due to rupture. There is no clear consensus regarding the optimal management strategy. This case shows that timely management can lead to good outcomes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2008
Journal Name
2008 15th Asia-pacific Software Engineering Conference
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

View Publication
Scopus (16)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Sat Apr 08 2023
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
How to Estimate the Major Petrophysical Properties: A Review
...Show More Authors

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Nov 11 2020
Journal Name
Sys Rev Pharm
Recent Development In Oxine Complexes AndTheirMedical Application: A Review
...Show More Authors

This review is concluded of 8-Hydroxyquinline (8HQ) compound and derivatives which has a very significant interests with a strong fluorescence , furthermore the relationship between divalent metal ions and characteristic of chelating . In the same way coordinated features have increase of its organic action and inorganic behavior by giving many samples of compounds which are a good chelating agents ligands with more capable of forming very stable complexes.Therefore, the role of (8HQ) is not limited on complexes only but its applications in different fields so this review will focus on demonstration preparation methods and properties of (8HQ) derivatives with their complexes and applications, hopefully that we will cover a part of scientifi

... Show More
Publication Date
Sat Jul 01 2023
Journal Name
Rawal Medical Journal
Obesity in COVID-19 patients is a complex interaction
...Show More Authors

Objective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and

... Show More
Scopus Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref