Background: Non-traumatic Intracerebral Hemorrhage (ICH) results from rupture of blood vessels in the brain. ICH categories can also be considered as being either lobar in location or within the deep white matter. Although hypertension is a major risk factor for ICH in general[11], it is commonly considered to be associated more with patients having deep than with those having lobar haemorrhage.
Objectives: We investigate the relationship between hypertension and deep versus lobar intracerebral hemorrhage (ICH).
Methods: a retrospective review of records of 163 patients aged 18-89 years admitted to Al-Kadhimiya Teaching Hospital (January 2008 - October 2010) and diagnosed with ICH.
Results: There was no significant relationship between hypertension in deep versus lobar intracerebral hemorrhage (p=0.814)
Conclusions: Although the relation between hypertension and ICH was not found to be significant, our study suggests and recommends age-appropriate investigations for patients with ICH, as well as the need to promote patients’ education with regards to this disease and the importance of adherence to treatment of risk factors.
Background: The Harmonic scalpel (HS) has been proven to be an effective, efficient, and safe instrument for dissection and hemostasis in both open and laparoscopic surgical procedures. The primary use of the HS in laparoscopic cholecystectomy (LC) has been for the division of the cystic artery and liver bed dissection. Advancements in the Harmonic scalpel blade tip now provide for the reliable ultrasonic division and closure of the cystic duct.
Objectives: This study was planned to compare the clips and cautery (CC) method of laparoscopic cholecystectomy (LC) versus LC using HS as regard to the safety and efficacy for symptomatic gallstone disease.
Patients and methods: This is a prospective study conducted in Baghdad Teaching Hos
High Q-factor based on absorption can be achieved by tuning (the reflection and the transition percentage). In this work, the simple design and simulated in S-band have been investigated. The simulation results of G-shape resonator are shown triple band of absorption peaks 60%, 91.5%, and 70.3%) at resonance frequency 2.7 GHz, 3.26 GHz, and 4.05 GHz respectively. The results exhibited very high of the Q-factor ( 271 ) at resonance frequency ( 3.26 GHz ). The high Q-factor can be used to enhance the sensor sensing, narrowband band filter and image sensing.
Many developments happened in Service Oriented architecture models but with no details in its technology and requirement. This paper presents a new Service Oriented Architecture (SOA) to all Service Enterprise (SE) according to their demands. Therefore, the goal is to build a new complete architecture model for SOA methodologies according to current technology and business requirements that could be used in a real Enterprise environment. To do this, new types of services and new model called Lego Model are explained in details, and the results of the proposed architecture model in analyzed. Consequently, the complications are reduced to support business domains of enterprise and to start associating SOA methodologies in their corporate s
... Show MoreThe purpose of this paper is to introduce a new type of compact spaces, namely semi-p-compact spaces which are stronger than compact spaces; we give properties and characterizations of semi-p-compact spaces.
Competitive swimming is a highly researched area and technological developments have aided advances in the understanding of the biomechanical principles that underpin these elements and govern propulsion. Moreover, those working in the sports field especially in swimming are interested in studying, analyzing, evaluating and developing motor skills by diagnosing the strengths and weaknesses of the skill, and accordingly, coaches and specialists correct these errors. The researchers chose this (Butterfly swimming) and the (arm length) is an important variable because the success of the stroke is greatly dependent on the propulsion generated from the arm pull, and swimmers with a longer arm span have a mechanical advantage with the resulting f
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreThe main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More