Preferred Language
Articles
/
hxcF944BVTCNdQwCWlqb
Effectiveness of conservative management of uncomplicated acute appendicitis: A single hospital based prospective study
...Show More Authors
<bold>ABSTRACT</bold> <sec> <title>Background:

Acute appendicitis is one of the commonest causes of acute abdomen. There is a wide discussion and controversy on the surgical and nonsurgical treatment of acute uncomplicated appendicitis. The aim of this study was to evaluate the efficacy and outcomes of the conservative management of selected cases of acute appendicitis with an antibiotic first plan.

Patients and methods:

This was a single hospital-based prospective study with a duration of 25 months. Patients with clinical and radiological features of acute appendicitis presenting within 72 h of the beginning of abdominal pain with Alvarado score ≥5 were included. The patients received a therapeutic dose of broad-spectrum antibiotics and symptomatic treatment. The follow-up period was 6 months.

Results:

90 patients were evaluated, 54 (60%) patients were female and 36 (40%) patients were male with mean age 34.4 years. Conservative treatment was successful in 68 (75.6%) patients and failed in 22 (24.4%) patients. No mortality recorded in this study. The main complications which occurred in those patients who failed to respond to conservative treatment were perforated appendicitis (3 patients), appendicular abscess (3 patients) and appendicular mass (4 patients).

Conclusion:

Majority of cases of the first attack of uncomplicated acute appendicitis can be treated successfully by conservative treatment. However, conservative treatment demands precise communication, close monitoring and follow-up to recognize failure which needs to be treated immediately by surgery.

Highlights:
Scopus Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Tropical Journal Of Natural Product Research
Expression of algD Gene in Single- and Dual-Species Biofilms of Pseudomonas aeruginosa and Staphylococcus aureus Under Starvation Stress
...Show More Authors

Dual-species biofilms of Pseudomonas aeruginosa and Staphylococcus aureus generate difficult-to-treat illnesses. Nutrition stress in biofilms affects physiology, microbial metabolism, and species interactions, impacting bacteria growth and survival. Furthermore, the function of alginate, which is encoded by the algD gene, in the production of biofilms has been established. The present study aimed at investigating the impact of starvation on algD gene expression in single-species biofilm of P. aeruginosa and dual-species biofilms of P. aeruginosa and S. aureus from hospital sewage. A total of six P. aeruginosa and six S. aureus isolates were obtained from the microbiology laboratory at the Department of Biology, College of Science, Universit

... Show More
View Publication
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Integrated Approach for Management OF Supply chain and relationship with MRP
...Show More Authors

 

Find interested in the harmonization of variables and determinants of supply chain planning needs of the material, leading to the results start effective supply chain management, and end up quickly modify the sizes to suit the demand and turnover in the market. As well as identifying relationships between variables, and type of relationship used by the company with the processors and their feasibility, and indicate the level of interest and willingness to redesign the supply chain Company for Electrical Industries and build an integrated model for supply chain with the MRP system can be applied in the company.

Research depend on quantitative and descriptive method, It

... Show More
View Publication
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Green Human Resources Management in Achieving Sustainable Development
...Show More Authors

The research aims at clarifying the role of green human resource management practices in achieving sustainable development. The research problem is that the health sector is less concerned with environmental aspects, specifically green human resource management practices, Which are reflected on sustainable development with their economic, environmental and social dimensions as well as reducing costs, waste minimization and recycling, And the research started from two main hypotheses to explore the correlation and influence between the variables of the research by analyzing the answers of the research sample, which included (136) employees of the Al-Imamein Al-kadhemein medical city, Data and information were collected using quest

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Developing System of Solid Waste Management (Applied Research in Hilla City)
...Show More Authors

Abstract

The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa

... Show More
View Publication Preview PDF
Crossref