Objective: To determine the effectiveness of hypothermia on renal functions for patients undergoing
coronary artery bypass graft CABG surgery.
Methodology: A purposive (non-probability) sample of (50) patients undergoing Isolated coronary artery
bypass graft surgery consecutively admitted to the surgical ward, and they were followed up in the
intraoperative, Intensive Care Unit (ICU) and in the postoperative (surgical ward). Post-operative renal function
test (glumeruler filteration rate (GFR) by using the Crockroft-Gault formula and serum creatinine level) was
determined first week post operative and post operative renal function was classified on the base of peak of
the serum creatinine level and decline of glomeruler filteration rate(GFR) as following : normal renal function
serum creatinine concentration and decline in(GFR) less than 25% from preoperative, moderate renal
dysfunction increase serum creatinine concentration and decline in(GFR) 25%-50% from preoperative, sever
renal dysfunction increase serum creatinine concentration and decline in(GFR) more than 50% from
preoperative test.
Results: results of this study show that (78%) from the sample develop post operative renal dysfunction and
the highly percentage of them are male (50%), advance age 60-70 (60%), smoking (47.0%), diabetes mellitus
DM (68%), cardiopulmonary bypass 180 and more (57.20%), New York Heart Association calcification NYHA
class III(47.5%) and patient without Intra Aortic Balloon Pump IABP(50,0%) . We conclude from the study that
highly percentage of patient undergoing isolated CABG may develop postoperative renal dysfunction even
when using hypothermic strategy as a protective measure and the patients with DM, male, advance age,
smoker, prolong time of CPB (more than 180 minutes), NYHA class III and patient without IABP are considered
as patient at high risk to develop postoperative renal dysfunction.
Recommendations: The researcher recommended that to find addition strategy rather than hypothermia
to protect renal function especially with the high risk patients during isolated CABG surgery.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreThe refractive index sensors based on tapered optical fiber are attractive for many industries due to sensing capability in a variety of application. In this paper, we proposed a refractive index sensor based on multicore fiber (MCF) sandwiched between two standard single mode fibers (SMF). The sensor consisting of three sections, SMF- MCF-SMF is structurally simple and can be easily produced by joining these parts. The MFC contains seven cores and these cores are surrounded by a single cladding. The sensing region is obtained by tapering the MCF section where the evanescent field is generated. The single mode propagating along the SMF is stimulated at the first joint and is coupled to the cladding modes. These modes interfere with the core
... Show More-convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties. Some examples to illustrate the aforementioned concepts and to cl
... Show MoreIn this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.
An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreVoting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabr
... Show MoreAbstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreMost cultivars of sorghum have low field emergence as common problem. Three experiments were carried out at Agriculture College, Baghdad University. First experiment was conducted in laboratory according to Complete Randomized Design (CRD) with four replicates. Second and third experiments were conducted at field according to Randomized Complete Block Design (RCBD) during the spring and the fall seasons of 2015, respectively, with four replicates for each one. Same two factors were studied at each experiment. First factor was seed priming by seed soaking for 10 hours in distilled water, solvents of GA3, KCl and thiamine (300, 40 and 30 mg*L-1, respectively) and non-primed seed. Second factor was three cultivars of sorghum (Inqath, Kafier an
... Show More