Objective: To review and see the pattern of histopathological diagnoses of one year appendectomy specimens.
Methodology: This retrospective study was carried in Sulaimani Teaching Hospital over the period of one year (from 1st
of January to 31st of December 2009). All pathological reports were reviewed retrospectively for patient’s age, sex,
histopathological diagnosis and operative findings (if present). Histopathological diagnoses then were classified into
either positive or negative for acute inflammation. Any associated findings or any surgical specimen removed with the
appendix was recorded. The obtained data were analyzed by using the statistical package social sciences (SPSS) version
19; with Chi square to test for significance between data.
Results: Hospital pathological reports of 2052 appendectomy cases were reviewed, (47.12%) were males and (52.88%)
were females. 61.9% of all appendectomy cases were positive for acute inflammation (32.9% had acute appendicitis;
26.1 % had acute suppurative appendicitis , and 4.5% had gangrenous appendicitis), while 38.1% were negative (28.5 %
had reactive follicular hyperplasia, 6.2% were normal, and 0.2% had carcinoid tumors). Negative for acute
inflammation cases were generally significantly more common in females e.g. periappendicitis, Reactive Follicular
Hyperplesia and carcinoid tumor but eosinophilic appendicitis cases like acute appendicitis were more common in
males. Normal appendixes versus Reactive Follicular Hyperplesia (without associated appendicitis) are two entities that
intermingle. Chronic appendicitis is controversial entity. Out of 20 cases with Entrobius vermicularis (95%) cases were
associated with reactive follicular hyperplasia and it shows non significant association with acute appendicitis.
Recommendation: We recommend that the pathologists must be strict to histological criteria for each pathological
entity before the diagnosis.
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe study aims to review the literature on the fundamental changes in Managerial Accounting (MA) in light of accelerating Digital Transformations (DT) and increasing Sustainability Requirements (SR) from 2020 to August 2025, with the purpose of informing researchers and professionals about recent developments. The study relied on a qualitative analysis of the content of a group of studies indexed in the Scopus database. The study included a literature review of topics such as artificial intelligence tools and techniques, cloud computing, linear programming, sustainability reporting, and strategic managerial accounting practices. The study results revealed that accelerated DT improves the efficiency of managerial accounting practices
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreCurrently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreIn this work, we focused on studying 1,4-naphthoquinones and their derivatives, and knowing the methods of preparing them using different auxiliary agents and forming derivatives containing heterocyclic rings, active groups and saturated rings containing heterogeneous elements . In addition, due to their strong antibacterial, antifungal and anticancer activity, 1,4-naphthoquinone compounds biological importance and are considered a source of various pharmaceutical compounds.
ole in all sta Oil well logging, also known as wireline logging, is a method of collecting data from the well environment to determine subterranean physical properties and reservoir parameters. Measurements are collected against depth along the well's length, and many types of wire cabling tools depend on the physical property of interest. Well probes generally has a dynamic respon to changes in rock layers and fluid composition. These probes or well logs are legal documents that record the history of a well during the drilling stages until its completion. Well probes record the physical properties of the well, which must then be interpreted in petrographic terms to obtain the characteristics of the rocks and fluids associated with
... Show MoreMost of the water pollutants with dyes are leftovers from industries, including textiles, wool and others. There are many ways to remove dyes such as sorption, oxidation, coagulation, filtration, and biodegradation, Chlorination, ozonation, chemical precipitation, adsorption, electrochemical processes, membrane approaches, and biological treatment are among the most widely used technologies for removing colors from wastewater. Dyes are divided into two types: natural dyes and synthetic dyes.
Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreThere is no access to basic sanitation for half the world's population, leading to Socioeconomic issues, such as scarcity of drinking water and the spread of diseases. In this way, it is of vital importance to develop water management technologies relevant to the target population. In addition, in the separation form of water treatment, the compound often used as a coagulant in water treatment is aluminum sulfate, which provides good results for raw water turbidity and color removal. Studies show, however, that its deposition in the human body, even Alzheimer's disease, can cause serious harm to health and disease development. The study aims to improve the coagulation/flocculation stage related to the amount of flakes, i
... Show More