Preferred Language
Articles
/
jkmc-1060
‘Peacock tail’ Clipping Technique for a Giant Middle Cerebral Artery Aneurysm: A Technical Note
...Show More Authors

Background: Giant middle cerebral artery (MCA) aneurysms are surgically challenging lesions. Because of the complexity and variability of these aneurysms, a customized surgical technique is often needed for each case. In this article, we present a modified clip reconstruction technique of a ruptured complex giant partially thrombosed middle cerebral artery aneurysm.

Case description: The aneurysm was exposed using the pterional approach. Following proximal control, the aneurysm sac was decompressed. Then, we applied permanent clips to reconstruct the aneurysm neck. The configuration of the aneurysm mandated a tailored clipping pattern to account for residual aneurysm sac sagging beyond the confinement of the single inflow and the two outflow channels. As a result, clipping in a fanning pattern was done to obliterate the lateral extensions while retaining a smooth curvature of the reconstructed neck. This final clipping pattern mirrored the arrangement of the peacock tail feathers. The 'peacock tail’ clipping technique can be thought of as a variation of the traditional straight tandem clipping, also known as 'picket-fence,' applied to less complicated aneurysm configurations.

Conclusion: Giant MCA aneurysms may demand an adaptive clipping technique to account for the unique geometry of each aneurysm. In this paper, we described the 'peacock tail’ clipping technique for clip reconstruction of a giant complex partially thrombosed M2 MCA aneurysm as a modification of the conventional tandem clipping technique.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of Corrosion Parameters for a Cathodic Reaction Complicated by IR Drop Effect in a Flow System
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Oct 18 2018
Journal Name
European Journal Of Organic Chemistry
PdII-Mediated Oxidative Amination for Access to a 9-Azabicyclo[4.2.1]nonane Compound Library and Anatoxin-a
...Show More Authors

View Publication Preview PDF
Crossref (5)
Clarivate Crossref
Publication Date
Mon Mar 02 2020
Journal Name
Journal Of Applied Research In Higher Education
Proposal of a guide for talent evaluation and management based on a qualitative and three-staged approach
...Show More Authors
Purpose

The key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.

Design/methodology/approach

The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty-three individuals from six Australian universities parti

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2024
Journal Name
Wasit Journal For Pure Sciences
A New Class of Higher Derivatives for Harmonic Univalent Functions Established using a Generalized Fractional Integral Operator
...Show More Authors

A new class of higher derivatives  for harmonic univalent functions defined by a generalized fractional integral operator inside an open unit disk E is the aim of this paper.

View Publication
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 24 2022
Journal Name
Egyptian Journal Of Chemistry
A novel Tubular Electrochemical Reactor with a Spiral Design of Anode for Treatment of Petroleum Refinery Wastewater
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2019
Journal Name
International Journal Of Environmental Research
A Comparative Study for the Identification of Superior Biomass Facilitating Biosorption of Copper and Lead Ions: A Single Alga or a Mixture of Algae
...Show More Authors

View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal: Ibn Al-haitham Journal For Pure And Applied Sciences
A Study the effect the direction of the distribution of lighting to improve Images in different lighting by using technique adaptive histogram equalization
...Show More Authors

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Academia Open
Positioning Preterm Newborns for Cardiorespiratory Stability A Global Insight
...Show More Authors