Preferred Language
Articles
/
jkmc-124
Outcome Of Surgical Treatment Of Tuberculosis Of The Spine In Patients With Motor Deficits
...Show More Authors

Background: Significant numbers of patients with spinal tuberculosis (TB), especially in developing countries, still present late after disease onset with severe neurological deficits.

Objective:This study was conducted to assess the outcome of surgery in patients with tuberculosis of the spine with motor deficits.

Type of the study: Retrospective study.

Methods: We retrospectively analyzed data obtained in all the patients with severe motor deficits due to spinal TB admitted to and surgically treated in four hospitals in Baghdad/Iraq during the period from January 2012 to January 2014. History, examination, imaging, histological, postoperative, and follow-up data were retrospectively culled from hospitals records and then analyzed.  Data obtained in 48 patients with 6-24 months of follow up (mean follow-up period 12.8 months) were analyzed. The disease in 34 patients was characterized by Frankel Grade A/B and in 14 patients by Frankel Grade C at admission.

Results: Thirty (88%) of the 34 patients with Frankel Grade A/B status and 13 (92.8%) of the 14 patients with Frankel Grade C status at admission experienced improvement to Frankel Grade D/E (walking with or without support) at the last follow-up examination after surgery. The degree of improvement exhibited by patients with a Frankel Grade A/B spinal cord injury was comparable to that shown by patients with Frankel Grade C status. Even patients with flaccid paraplegia, gross sensory deficit, prolonged weakness, spinal cord signal changes demonstrated on magnetic resonance imaging, and bladder involvement have experienced dramatic improvement in motor function since surgery. A significant number of the patients have shown remarkable improvement in other symptoms such as pain (91.6%), spasticity (88%), and bladder symptoms (88%).

Conclusions: A significant proportion of patients with spinal TB and severe motor deficits experience remarkable improvement after surgical decompression and hence should undergo surgery even though they may be suffering from paraplegia of considerable duration

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Creeds in Assyrian Sculpture: جبــــــــــار محمـــــــــــــود حسين العــــــبيدي-حسام عبد الخالق عثمان الطائي
...Show More Authors

The research covered Creeds in Assyrian Sculpture

 (Assyrian Sculptures) The ability of the Assyrian sculptor to

 contrast these creeds and tendon in Assyrian sculpture, in various variations, including prominent and stereotypical plaques and winged bulls, in addition to the obelisks and hunting scenes of the Lionسion hunting scenes of the black                                                               

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Optimum conditions for ascorbic acid determination in three Iraqi citrus using HPLC technique
...Show More Authors

A high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Coated stainless steel archwires' discoloration measured by computerized system (An in-vitro study)
...Show More Authors

Background: Aesthetic archwires are used to overcome the aesthetic problems of stainless steel wires but the color of the coating layer can be changed with time when exposed to oral environments. The aim of this study was to evaluate the degree of color change of different aesthetic archwires from different companies under different coloring solutions. Materials and Methods: One hundred fifty samples of coated archwires from three companies (Highland, G&H and Dany) were immersed in 5 solutions (artificial saliva, turmeric, tea, coffee and Miranda) to evaluate the degree of color changes after 7, 14 and 21 days using visible spectrophotometer. Data were collected and analyzed using one way ANOVA and post hoc Tukey’s tests. Resu

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Materials Letters
Temperature stable electric field-induced strain in Er-doped BNT-BT-BKT ceramics
...Show More Authors

View Publication
Scopus (15)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Jordon: Al-ahliyya Publishing House
Unity in diversity: Interfaith Dialogue(translated into Arabic), Jordon: Al-Ahliyya Publishing House.
...Show More Authors

Publication Date
Wed Dec 20 2023
Journal Name
Discourse And Interaction
Refusal and politeness strategies favoured among Iraqi and Malaysian learners in marriage proposals
...Show More Authors

The study targets exploring the similarities and differences between Iraqi and Malaysian learners of English in refusing marriage proposals. Also, it examines the favored politeness strategies that learners use to protect their interlocutors’ face, heeding both their social distance and status. Data were gathered by a Discourse Completion Task (DCT) which contained six marriage situations. Responses were analyzed based on Beebe et al.’s (1990) refusal taxonomy and Scollon et al.’s (2012) politeness system. The findings indicated that both the Iraqi and Malaysian learners preferred the indirect refusal strategies in marriage proposals, as well as the hierarchical politeness in the form of independence strategies regardless of t

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Petroleum Research And Studies
Stress Ratio Method to Predict Fracture Pressure Gradient in Southern Iraqi Deep Wells
...Show More Authors

This research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref