Objective: To determine the effectiveness of hypothermia on renal functions for patients undergoing
coronary artery bypass graft CABG surgery.
Methodology: A purposive (non-probability) sample of (50) patients undergoing Isolated coronary artery
bypass graft surgery consecutively admitted to the surgical ward, and they were followed up in the
intraoperative, Intensive Care Unit (ICU) and in the postoperative (surgical ward). Post-operative renal function
test (glumeruler filteration rate (GFR) by using the Crockroft-Gault formula and serum creatinine level) was
determined first week post operative and post operative renal function was classified on the base of peak of
the serum creatinine level and decline of glomeruler filteration rate(GFR) as following : normal renal function
serum creatinine concentration and decline in(GFR) less than 25% from preoperative, moderate renal
dysfunction increase serum creatinine concentration and decline in(GFR) 25%-50% from preoperative, sever
renal dysfunction increase serum creatinine concentration and decline in(GFR) more than 50% from
preoperative test.
Results: results of this study show that (78%) from the sample develop post operative renal dysfunction and
the highly percentage of them are male (50%), advance age 60-70 (60%), smoking (47.0%), diabetes mellitus
DM (68%), cardiopulmonary bypass 180 and more (57.20%), New York Heart Association calcification NYHA
class III(47.5%) and patient without Intra Aortic Balloon Pump IABP(50,0%) . We conclude from the study that
highly percentage of patient undergoing isolated CABG may develop postoperative renal dysfunction even
when using hypothermic strategy as a protective measure and the patients with DM, male, advance age,
smoker, prolong time of CPB (more than 180 minutes), NYHA class III and patient without IABP are considered
as patient at high risk to develop postoperative renal dysfunction.
Recommendations: The researcher recommended that to find addition strategy rather than hypothermia
to protect renal function especially with the high risk patients during isolated CABG surgery.
This research aimd to analyze the role of strategic entreprenenial on according to the external performance of a sample of Iraqi private banks, namely, (National Islamic Bank, Iraqi Ahli Bank, Baghdad Bank , Middle East Iraqi Investment Bank) has launched research in fundamental problem stems from the question seeking his response to the characterization of the problem which is improve banking performance through strategic entreprenenial and to achieve the goal of the research was to prepare a questionnaire included a number of questions about the independent research and approved variables accounting for the independent variable strategic entreprenenial and included four dimensions (entreprenenial culture), entreprenenial leader
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreMost recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Synthetic polymers such as polyurethane are used widely in the field of biomedical applications such as implants or part of implant systems.
This paper focuses on the preparation of base polymer matrix composite materials by (Hand Lay-Up) method, and studying the effect of selected grain size (32, 53, 63, 75, and 90) µm of (Reenia) particles on some properties of the prepared composite.
Mechanical tests were used to evaluate the prepared system (Tensile, Compression, Impact, and Hardness) tests, and a physical test of (Water absorption %), and all tests were accomplished at room temperature.
Where results showed tensile test (maximum tensile strength and modulus of elasticity) high at small grain size while
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More