Preferred Language
Articles
/
jkmc-124
Outcome Of Surgical Treatment Of Tuberculosis Of The Spine In Patients With Motor Deficits
...Show More Authors

Background: Significant numbers of patients with spinal tuberculosis (TB), especially in developing countries, still present late after disease onset with severe neurological deficits.

Objective:This study was conducted to assess the outcome of surgery in patients with tuberculosis of the spine with motor deficits.

Type of the study: Retrospective study.

Methods: We retrospectively analyzed data obtained in all the patients with severe motor deficits due to spinal TB admitted to and surgically treated in four hospitals in Baghdad/Iraq during the period from January 2012 to January 2014. History, examination, imaging, histological, postoperative, and follow-up data were retrospectively culled from hospitals records and then analyzed.  Data obtained in 48 patients with 6-24 months of follow up (mean follow-up period 12.8 months) were analyzed. The disease in 34 patients was characterized by Frankel Grade A/B and in 14 patients by Frankel Grade C at admission.

Results: Thirty (88%) of the 34 patients with Frankel Grade A/B status and 13 (92.8%) of the 14 patients with Frankel Grade C status at admission experienced improvement to Frankel Grade D/E (walking with or without support) at the last follow-up examination after surgery. The degree of improvement exhibited by patients with a Frankel Grade A/B spinal cord injury was comparable to that shown by patients with Frankel Grade C status. Even patients with flaccid paraplegia, gross sensory deficit, prolonged weakness, spinal cord signal changes demonstrated on magnetic resonance imaging, and bladder involvement have experienced dramatic improvement in motor function since surgery. A significant number of the patients have shown remarkable improvement in other symptoms such as pain (91.6%), spasticity (88%), and bladder symptoms (88%).

Conclusions: A significant proportion of patients with spinal TB and severe motor deficits experience remarkable improvement after surgical decompression and hence should undergo surgery even though they may be suffering from paraplegia of considerable duration

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Food Science And Technology
Study on herbicide residues in soybean processing based on UPLC-MS/MS detection
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (99)
Crossref (91)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Applied Nursing Research
Examining perceived and actual diabetes knowledge among nurses working in a tertiary hospital
...Show More Authors

View Publication
Scopus (28)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Tue Jan 02 2024
Journal Name
Medical Oncology
COX 2-inhibitors; a thorough and updated survey into combinational therapies in cancers
...Show More Authors

View Publication
Scopus (23)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Fri Nov 29 2019
Journal Name
Iraqi Journal Of Physics
CdSe/CdS core/shell in polyacrylamide polymer matrix for Quantumdots Luminescent solar concentrator
...Show More Authors

Luminescent solar concentrator (LSC) are used to enhance       photoresponsivity of solar cell. The Quantumdots luminescent solar concentrator (QDLSC) consists of CdSe/CdS core/shell nanoparticles embedded in polyacrylamide polymer matrix positioned on the top surface of the silicon solar cell. This procedure improves the conversion efficiency of the bare silicon solar cell. The conversion efficiency of the solar cell has increased from 7.3% to 10.3%.  this improvement is referred to the widening of the response spectral region window  of the a- Si. Solar cell.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Lithology and minerals identification from well logs for Mishrif Formation in Ratawi oilfield
...Show More Authors

   Lithology identification plays a crucial role in reservoir characteristics, as it directly influences petrophysical evaluations and informs decisions on permeable zone detection, hydrocarbon reserve estimation, and production optimization. This paper aims to identify lithology and minerals composition within the Mishrif Formation of the Ratawi Oilfield using well log data from five open hole logs of wells RT-2, RT-4, RT-5, RT-6, and RT-42. At this step, the logging lithology identification tasks often involve constructing a lithology identification model based on the assumption that the log data are interconnected. Lithology and minerals were identified using three empirical methods: Neutron-Density cross plots for lithology id

... Show More
View Publication
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
OPEN CIRCUIT HEAT EXCHANGER DYNAMICS DURING FLOW REDUCTION TRANSIENT IN THEIR SECONDARY LOOPS
...Show More Authors

An experimental and theoretical analysis was conducted for simulation of open circuit cross flow heat
exchanger dynamics during flow reduction transient in their secondary loops. Finite difference
mathematical model was prepared to cover the heat transfer mechanism between the hot water in the
primary circuit and the cold water in the secondary circuit during transient course. This model takes under
consideration the effect of water heat up in the secondary circuit due to step reduction of its flow on the
physical and thermal properties linked to the parameters that are used for calculation of heat transfer
coefficients on both sides of their tubes. Computer program was prepared for calculation purposes which
cover a

... Show More
View Publication Preview PDF
Crossref