Preferred Language
Articles
/
iqjmc-846
Pyometra Presented With Rectal Pain, a Case Report and Review of Literature
...Show More Authors

Pyometra is an uncommon gynecological condition resulted from occlusion of the cervix usually by a malignant condition. It has an incidence of 0.1%-0.5%. Untreated pyometra leads to rupture uterus and acute infective peritonitis presented as acute abdomen and needs urgent surgical intervention. Pyometra resulted from occlusion of the vagina is very rare. No cases have been described in the English literature to the best of our knowledge and in the PubMed. The purpose of reporting this case is to show that occlusion of the vagina could occur in postmenopausal women as a consequence of local infection and results in pyometra and also to show that pyometra can be presented in a different way apart from the classical presentation. The way to reach the diagnosis and how to manage the case has been also discussed thoroughly.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Examine of Organizational Excellence by Corporation Performance Assessment Method; Case Study in Tikrit University
...Show More Authors

The research started from the basic objective of tracking the reality of organizational excellence in educational organizations on the basis of practical application. The research in its methodology was based on the examination of organizational excellence in the way of evaluating institutional performance. Tikrit University was selected as a case study to study the reality of application to the dimensions of organizational excellence in it, The results of the analysis for ten periods during the year and month. For the accuracy of the test and its averages, it was preferable to use the T test to determine the significance of the results compared to the basic criteria.

The research found that there is an o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Phantom Limb and pain after traumatic lower extremity amputation.
...Show More Authors

Background: Pain after amputation is a common squeal, patients often have a phantom limb sensation too, which can be painful or painless.
Objectives: This study describes the sensations and pain reported by patients after traumatic amputation of unilateral lower limb as well as the incidence and epidemiology of those sensations.
Patients and methods: A retrospective study of 118 patients who underwent lower limb amputation due to trauma. Patients scheduled for interview by means of a standard questionnaire and examined, days, weeks, months, years, after surgery about limb pain, phantom limb sensations, stump pain, back and shoulder pain .
Results: Statistical analysis revealed that the incidence of non-painful sensation was the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Types of Vinegar Available in Local Markets on Bacterial spp. Isolased from Rectal Fistula Abscess
...Show More Authors

  The current study was conducted to study some certain quantities of dates , apple and white vinegar.      It was noticed that the percentage of acetic acid was (3.6%, 4.5%, 2.7%), for each and respectively, it was found that vinegar has an inhibiter biological activity against bacteria isolated from rectal fistula inflammation cases.     It was also noticed that vinger types have ability to increase healing anus fistula and show no toxicity on laboratory mice.

View Publication Preview PDF
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Interleukine-6 Level in Saliva of Patients with Chronic Periodontitis: A Case-Control Study
...Show More Authors

Background:Periodontal diseases are infectious diseases in which periodontalpathogens trigger chronic inflammatory and immune responses. Interleukine-6 is a multifunctional cytokine playing a central role in inflammation and tissue injury.The aim of the study IS to determine the level of Interleukin-6(IL-6) in saliva of patients with chronic periodontitis compared to healthy subjects. Materials and Methods:The total subjects of the present study is 60, divided into 3 groups; 20 patients with chronic periodontitis with pocket depth(PD ≥4 mm)(group I), 20 patients with pocket depth(PD <4 mm) with clinical attachment loss (group II), and 20 healthy controls with pocket probing depth (PPD ≤ 3 mm) without clinical attachment loss (g

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Personal tax exemptions "a comparative study with some Arab and European system legislations
...Show More Authors

This research aims primarily to highlight personal tax exemptions A comparative study with some Arab and European regulations. And by conducting both theoretical comparative analyses. Most important findings of the study is the need to grant personal and family exemptions that differ according to the civil status of the taxpayer (single or married). In other words, the exemption increases as the number of family members depend on its social sense. Also taking into account some incomes that require a certain effort and looking at the tax rates, it is unreasonable for wages to be subject to the same rates applied to commercial profits.      

View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review
...Show More Authors

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref