Preferred Language
Articles
/
iqjmc-986
Anatomical Study of Axillary Artery Variation.
...Show More Authors

Background: The axillary artery is a direct continuation of the subclavian artery. The axillary artery is usually described as giving off six branches. The first part gives superior thoracic artery. The second part gives lateral thoracic (LT) and thoracoacromial(TAC) arteries. The third part gives three, subscapular(SS), anterior circumflex humeral(ACH)and posterior circumflex humeral(PCH) arteries. Anatomical variations in the branching pattern of axillary artery are quiet common and typically include the subscapular artery(SS), lateral thoracic artery(LT) and the posterior circumflex humeral artery(PCH). The variation of the axillary artery branching pattern has anatomical as well as clinical and surgical relevance given the proximity to the shoulder joint and humerus.
Patients & Method: Bilateral axilla dissection was conducted on 26 embalmed axillae (13 cadavers) to allow examination of the axillary artery and its branches. The study was carried out in Department of Human Anatomy, College of Medicine.
Results: The classical branching pattern of the LT originating from the axillary artery posterior to the pectoralis minor muscle and the SS producing the circumflex scapular (CS) artery and thoracodorsal(TD) occurred in 77%. The SS was observed originating from the LT 7% of the time. The LT was observed originating from the SS 5% of the time. The LT was observed producing the circumflex scapular artery and TD in the absence of SS 2.5% of the time. The PCH originated from four different sources, from the third part of axillary artery as is classically described in 77%. From the SS 11%. From deep brachial artery DB 9% and from LT 2%.
Conclusion: Vascular variation in the axillary artery and its branches is quiet common , This variation should be considered seriously as will implicate risk of bleeding during surgery in the axilla and also the difficulty in interpretation of the angiography after axillary catheterization.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Space of Fuzzy Orderings
...Show More Authors

In this paper the chain length of a space of fuzzy orderings is defined, and various properties of this invariant are proved. The structure theorem for spaces of finite chain length is proved. Spaces of Fuzzy Orderings Throughout X = (X,A) denoted a space of fuzzy orderings. That is, A is a fuzzy subgroup of abelian group G of exponent 2. (see [1] (i.e. x 2 = 1,  x  G), and X is a (non empty) fuzzy subset of the character group  (A) = Hom(A,{1,–1}) satisfying: 1. X is a fuzzy closed subset of  (A). 2.  an element e  A such that (e) = – 1    X. 3. X :={a  A\ (a) = 1    X} = 1. 4. If f and g are forms over A and if x  D(

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Self-Regulation of University Students
...Show More Authors

The current research aims to identify the self-regulation of university students, as well as to identify the significance of the difference in self-regulation according to the variable of sex (male-female), specialization (scientific-human), and grade (first-fourth). To achieve the research objectives, the two researchers developed a scale of (28) items about self-regulation According to the theory of (Pandora, 1991). The scale was administered to (500) students from the first and fourth stages of Al -Mustansiriyah University who were selected based on the random stratification method for the 2020/2021 academic year. The results showed that university students have a good level of self-regulation. There are no significant differences in

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2023
Journal Name
Journal Of Legal Sciences
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties,

Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application.

This study comes to shed light on the legal na

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Diagnoses System of Varicose Disease
...Show More Authors

The diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced n

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2000
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Preparation of Isosorbide Dinitrate
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Authorization of women in divorce
...Show More Authors

The Shari'a of Islam is the end of the laws revealed by God, including the goodness of the servants in the pension and the restored. They are supported by the enemies of Islam, especially in these days when the Islamic Ummah is subjected to a fierce campaign by its enemy to repel it from its religion through what they claim from the rights of women, including the right to equality with men.
      Islam came to announce to all mankind that women are part of life in society without which they can not imagine life for them. Islam did not leave women under the absolute authority of men, but raised their status and worked to liberate them, and these rights are divorced from her husband, does she have the right

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics of Picture and News
...Show More Authors

It has become familiar to see alchemy as a methodological approach that combines conscious, diverse, psychological, social, structural, and discrete approaches in the communications technology that Marshall McLuhan found to be able to extend our bodies and senses, The media discourse has a deep and superficial structure produced by the first, with its social, cultural and historical backgrounds, in a context that connects the image with the word, as the "meanings are made" - everywhere, as described by Jonathan ) In fashion, in the arts as a whole, and from its "signs" Our analysis of «meaning», in the media, and communication through advertising, magazines, newspapers, television, and the Internet. Therefore, alchemy is preoccupied wi

... Show More
View Publication Preview PDF
Publication Date
Sun May 08 2022
Journal Name
Al-kindy College Medical Journal
Surrogates Markers of Insulin Resistance
...Show More Authors

Insulin resistance is a fundamental feature of obesity, diabetes, and cardiovascular diseases and contributes to many of the metabolic syndrome's abnormalities. It is defined as a subnormal reaction to normal insulin concentrations or a situation in which greater than normal insulin concentrations are necessary for normal response.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Micropropagation of kiwi Actinidia chinensis
...Show More Authors

Shoot tip of Actinidia chinensis plant were excised and sterilized with mercuric chloride (Hgcl2) at concentration 0.1% for 5 min, then cultured on MS medium supplemented with benzeladinine BA at concentration (0.0,0.5,1.0,2.0,2.5) mg/l in multiplication stage Moreover, indole butyric acid IBA at concentration (0.0, 0.5,1.0,2.0,4.0) mg/l and (0.0,0.5,1.0,2.0) mg/l on solid and liquid solution media respectively in rooting stage were studied. All experiments have done under controlled conditions (25 ±2) Cº and 1000Lux light intensity for 16 hrs / day. Results revealed that supplementing the media with BA at concentrations 2.0 and2.5 mg/l was superior to give highest rate of shoot and number of leaves reached 5.8 /explant and 6.0 l

... Show More
View Publication Preview PDF
Crossref