Preferred Language
Articles
/
iqjmc-145
The treatment of non complicated sacrococcygeal pilonidal sinus by minimal excision and primary closure technique
...Show More Authors

Background: The surgical treatment of pilonidal sinus varies from wide excision and laying the wound open or excision with primary closure or excision with the use of skin graft in some special cases.
Objectives: The objectives of this study is to determine the efficacy of treating non complicated pilonidal sinus disease with minimal excision and primary closure technique, complications and recurrence rate.
Patients and methods: This is a prospective study conducted in shahid ahmed ismaiel hospital in rania – As sulaimania IRAQ during the period from December 2013 to January 2016 and was carried on one hundred (100) consecutive patients with non complicated non recurrent pilonidal sinus patients who were treated with minimal excision and primary closure technique. The data were analyzed focusing mainly on complications mainly infection, gapping, wound disruption, recurrence rate and patient’s compliance to antibiotics use and local wound care.The results obtained were compared with other similar studies.
Result: One hundred patients with non complicated pilonidal sinus were treated with minimal excision and primary closure technique.Fifteen patients developed superficial wound infection, seventeen patients developed simple superficial wound gapping .Three patients developed deep wound infection with disruption. Four patients developed recurrence and they were treated with re-excision and skin graft placement. Minimal follow up was six months, Operations were done under general or spinal anesthesia .operative time ranged between 12 to 22 minutes (mean time 17 minutes).
Conclusion: Minimal excision and primary closure technique for the treatment of pilonidal sinus disease is associated with short hospital stay, shorter off work time, less cost, low complications rate and low chance of recurrence.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Determination Of The Efficient Production Plans For Al-Shaheed Public Company By Using Tatget Motad Model Under Risk And Uncertainty
...Show More Authors

The research aims to derive the efficient industrial plans for Al – shaheed public company under risk by using Target MOTAD as a linear alternative  model for the quadratic programming models.

The results showed that there had been a sort of (trade- off) between risk and the expected gross margins. And if the studied company strives to get high gross margin, it should tolerate risk and vice versa. So the management  of Al- Shaheed Company to be invited to apply the suitable procedures in the production process, in order to get efficient plans that improves it's  performance .

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Experimental and Numerical Investigation on the Performance of Straight-Bladed Vertical Axis Wind Turbine by Adding Cavities to it Structure
...Show More Authors

As the prices of the fuel and power had fluctuated many times in the last decade and new policies appeared and signed by most of the world countries to eliminate global warming and environmental impact on the earth surface and humanity exciting, an urgent need appeared to develop the renewable energy harnessing technologies on the short-term and long-term and one of these promising technologies are the vertical axis wind turbines, and mostly the combined types. The purpose of the present work is to combine a cavity type Savonius with straight bladed Darrieus to eliminate the poor self-starting ability for Darrieus type and low performance for Savonius type and for this purpose, a three-bladed Darrieus type with symmetric

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Brain, Behavior, And Immunity
Combination of cannabinoids, delta-9-tetrahydrocannabinol (THC) and cannabidiol (CBD), mitigates experimental autoimmune encephalomyelitis (EAE) by altering the gut microbiome
...Show More Authors

View Publication Preview PDF
Scopus (124)
Crossref (128)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Studying the Crystal Structure, Topography, and Anti-bacterial of a Novel Titania (TiO2 NPs) Prepared by a Sol-gel Manner
...Show More Authors

In this research, titanium dioxide nanoparticles (TiO2 NPs) were prepared through the sol-gel process at an acidic medium (pH3).TiO2 nanoparticles were prepared from titanium trichloride (TiCl3) as a precursor with Ammonium hydroxide (NH4OH) with 1:3 ratio at 50 °C. The resulting gel was dried at 70 °C to obtain the Nanocrystalline powder. The powder from the drying process was treated thermally at temperatures 500 °C and 700 °C. The crystalline structure, surface morphology, and particle size were studied by using X-ray diffraction (XRD), Atomic Force Microscopy (AFM), and Scanning Electron Microscope (SEM). The results showed (anatase) phase of titanium dioxide with the average grain size

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 11 2007
Journal Name
Journal Of Al-nahrain University
KINETICS AND MECHANISM STUDIES OF OXIDATION OF Α-AMINO ACIDS BY N-BROMOSUCCINIMIDE
...Show More Authors

Kinetics and mechanism studies of oxidation of some α-amino acids (Proline, Arginine, Alanine) (AA) by N-Bromosuccinimide (NBS) by using conductivity method was carried out. The kinetic study showed that the reaction was first order with respect to NBS and AA. The effect of addition of HClO4 to the reaction was negative on the rate of reaction. The reaction was carried out at different temperatures in which  * * *   , S , G were calculated. The rate of reaction of AA was as follows: Proline > Arginine > Alanine

Publication Date
Thu Sep 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Determination of Surface Roughness and Accuracy of Alginate Impression Material Disinfected by Immersion
...Show More Authors

Background: This study was conducted to evaluate the surface roughness and dimensional accuracy of commercially obtainable alginate impression material in terms of imbibition after immersion in two different media. Materials and method: Two disinfecting agents, ethanol 70% and povidone-iodine 4%, were used to access the dimensional accuracy and surface roughness of alginate impression material. Weights of specimen discs of alginate impressions were measured before and immediately after immersion to gain a measure of imbibition. For surface roughness, disinfected specimens rectangle was examined before and after disinfection. Results: Minimal changes in weight were observed after disinfection, but a statistically non-significant differenc

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu May 04 2023
Journal Name
Journal Of Communicable Diseases
Enhancement of Swarming and Inhibition of Prodigiosin in Serratia marcescens by Glyceryl Trinitrate
...Show More Authors

Introduction:Serratia marcescens is a gram-negative pathogen of many species. Its pathogenicity and survival are linked to its capacity to build biofilms as well as its strong inherent resistance to antimicrobials and cleaning agents. Objectives: To analyse the impact of glyceryl trinitrate (GTN) on the gene expression of QS-related genes (rssB, rsmA,and pigP) of S. marcescens. Methodology: The broth microdilution technique estimated the bactericidal effectiveness of glyceryl trinitrate. The presence of rssB, rsmA,and pigP in S. marcescens isolates was detected using PCR. qRT-PCR was used to assess the effect of GTN on rssB, rsmA,and pigPgene expression. Results: The results demonstrated that GTN has no effect on S. marcesce

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Human recognition by utilizing voice recognition and visual recognition
...Show More Authors

Audio-visual detection and recognition system is thought to become the most promising methods for many applications includes surveillance, speech recognition, eavesdropping devices, intelligence operations, etc. In the recent field of human recognition, the majority of the research be- coming performed presently is focused on the reidentification of various body images taken by several cameras or its focuses on recognized audio-only. However, in some cases these traditional methods can- not be useful when used alone such as in indoor surveillance systems, that are installed close to the ceiling and capture images right from above in a downwards direction and in some cases people don't look straight the cameras or it cannot be added in some

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Conjunctive Adverbials Used by Iraqi Men and Women Authors
...Show More Authors

This paper highlights the main features of conjunctive adverbials and their occurrence in English academic prose. It accounts for the semantic roles of conjunctive adverbials, forms in which they are used, their positions within a sentence, and their frequency of occurrence in different registers with special reference to academic prose. It also tries to investigate possible differences in men's and women's use of conjunctive adverbials.
Keyword: conjunctive adverbials, linking adverbials, stance adverbials, circumstance adverbials, academic prose

View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More