Preferred Language
Articles
/
iqjmc-1849
Surgery of Eventration of the Diaphragm
...Show More Authors

Abstract

Background: Eventration of diaphragm is an abnormal elevation of the diaphragm. Publishing on eventration of diaphragm in Iraq is scarce.

Objective: This study was carried out to report on the Iraqi experience on eventration of diaphragm.

Methods: A total of 18 patients with eventration diaphragm were included in this study. A review of case records of patients with eventration diaphragm treated in Ibn Al-Nafees Teaching Hospital was done. Review of records took place for the period of March 2012 to Dec. 2017.

Results: The age of patients was ranged 5 months to 70 years, giving male to female ratio of 2:1. Dyspnea was dominating presenting symptoms followed by cough. The left hemidiaphragm was the most affected site (83.3%). The cause of eventration of diaphragm was idiopathic in 72.2% of patients. Chest X ray showed the elevation of the affected hemidiaphragm. CT scan demonstrated the thinned-out raised hemidiaphragm. The most common complications were atelectasis, and recurrent chest infection. Hospital stay was ranging 4-14 days.

Conclusion: Eventration of diaphragm is not uncommon in Iraq. Presentation, management, and complication are similar to that reported in global centers.  

Key words: 

Diaphragm. Eventration.  Plication. Surgical repair. Phrenic nerve injury  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
College Of Islamic Sciences
Moderate discourse and civil peace
...Show More Authors

Abstract

  Currently, the “moderate discourse and civil peace” represents a rich and important topic for scholars, due the rise of waves of extremism and Islamophobia campaigns, and what that leads to in term of imbalance in relations between nations and peoples.

Based on that, the research approach was to tackle the culture of hatred and calls for the clash of civilizations.

In order to contribute to solving these problems caused by cultural and religious prejudices, I decided to address the topic of “moderate discourse and civil peace” through two essential axes:

  • Features of moderate religious discourse
  • The role of moderate discourse in establishing communit

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Key Generator to Encryption Images Based on Chaotic Maps
...Show More Authors

It is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.

The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
A Modified Key Scheduling Algorithm for RC4
...Show More Authors

Rivest Cipher 4 (RC4) is an efficient stream cipher that is commonly used in internet protocols. However, there are several flaws in the key scheduling algorithm (KSA) of RC4. The contribution of this paper is to overcome some of these weaknesses by proposing a new version of KSA coined as modified KSA . In the initial state of the array is suggested to contain random values instead of the identity permutation. Moreover, the permutation of the array is modified to depend on the key value itself. The proposed performance is assessed in terms of cipher secrecy, randomness test and time under a set of experiments with variable key size and different plaintext size. The results show that the RC4 with improves the randomness and secrecy with

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Multibiometric System with Runs Bits Permutation for Creating Cryptographic key Generation Technique
...Show More Authors

    The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is  now  the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce  identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the  robust system.  In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 24 2020
Journal Name
International Journal Of Pharmaceutical Research
Preparation, spectral characterization and biological activity of somenewbimetalic complexes derived from{ 2,2`((5-methyl-1,3-phenylene)-bis- (oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}ligand
...Show More Authors

In this work, the preparation of new multidentate Schiff-base lig and and its metal complexes are described. The formation of the lig and{ 2,2`((5-methyl-1,3-phenylene)-bis-(oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}[H2L] was prepared from the reaction {2,2-((5-methyl-1,3-phenylene)-bis-(oxy))- di-(acetohydrazide)}[M]precursor and salicylaldehyde in a 1:2 mole ratio, respectively. The reaction of the lig and [H2L] with (Cr+3 , Mn+2 and Fe+2 )metal ions in a 1:2 (L:M) mole ratio. Ligand and complexes were characterised via spectroscopic analyses; [FT-IR, UV-Vis spectroscopy,(C.H.N) microanalysis, chloride content, thermal analysis(TG), electrospray mass, magnetic susceptibility and conductivity measurements. The characterisation d

... Show More
View Publication