Preferred Language
Articles
/
jkmc-13
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of Identification of RLN on decreasing the incidence of the nerveinjury .The benefits of identification of RLN evaluated in each procedure ofthyroidectomy which were total thyroidectomy (TT), near totalthyroidectomy (NTT), and subtotal thyroidectomy (STT).Patients were followed up monthly for 6 months by indirect laryngoscopy for mobility of the vocal cords.

Results: 132 patients underwent thyroidectomy,258 RLNswere at risk, 124 nerves were  identified and134 nerves were  not identified,1 RLN was injured in identified group, and  8 RLN were injured in non-identified group. The pvalue was (0.0393) which was significant. TT were performed for 56 patients (42.4%) and total hemi thyroidectomy(THT)  for 6patients(4.5%), there were 118 RLNs at risk, 64RLNs were identified and 54 RLNs were not identified.1RLN was injured in identified group, and 7RLNs were injured in non-identifiedgroup, the pvalue was(0.023)which was significant.NTT procedure were performed for 38 patients(28.8%) , 76 RLNs were at risk. 30 RLNswere identified and none of themwas injured, 46 RLNswere not identified, 1 RLN was injured the p value was(1)which was not significant.STT were performed for 32patients(24.4%),64 RLNs were at risk. 30 RLNs were  identified  and 34 RLNs not identified,there was no nerve injury in both groups .

Conclusions: identification of RLN decrease incidence of RLNI in TT, while there was no significant increase of RLNI in NTT and STT when the nerve was not identified

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Games with Soft -ᶅ-Pre-Generalized Open Sets
...Show More Authors

    In this paper, the concept of soft closed groups is presented using the soft ideal pre-generalized open and soft pre-open, which are -ᶅ- - -closed sets " -closed", Which illustrating several characteristics of these groups.  We also use some games and   -  Separation Axiom, such as (Æ®0, Ó¼, ᶅ) that use many tables and charts to illustrate this. Also, we put some proposals to study the relationship between these games and give some examples.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Serum Ferritin Levels for Iraqi Patients with Hashimoto's Thyroiditis
...Show More Authors

Background: The estimation of ferritin and related variables by complete serum iron profile, for Iraqi hashimoto’s patients to see the effect of thyroid hormone insufficiency, which may lead to deficiency of ferritin iron stores, this may be quite useful during the diagnosis and treatment of hashimoto’s patients. Patients and Method: The study was performed at National Center of Teaching laboratories of Medical city institute in Baghdad. Fifty newly diagnosed patients with hashimoto’s and forty apparently healthy controls. Diagnosis based on thyroid profile analysis including:Thyroid Stimulating Hormone (TSH), Thyroxine (totalT4) and Triiodothyronine (total T3), estimation of antibodies against thyroperoxidase, iron profile including:

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Multi-objectives probabilistic Aggregate production planning with practical application
...Show More Authors

In this research, has been to building a multi objective Stochastic Aggregate Production Planning model for General al Mansour company Data with Stochastic  demand under changing of market and uncertainty environment in aim to draw strong production plans.  The analysis to derive insights on management issues regular and extra labour costs and the costs of maintaining inventories and good policy choice under the influence medium and optimistic adoption of the model of random has adoption form and had adopted two objective functions total cost function (the core) and income and function for a random template priority compared with fixed forms with objective function and the results showed that the model of two phases wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Journal Of Pioneering Medical Science
Nurses' Perception Toward Therapeutic Strategies for Children with Pneumonia
...Show More Authors

Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
STATISTICAL ANALYSIS OF PATIENTS INFECTED WITH CORONAVIRUS USING MANOVA
...Show More Authors

Scopus (1)
Scopus
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Fexofenadine Adsorption by Activated Charcoal Impregnated with Hydrogen Peroxide
...Show More Authors

The adsorption of fexofenadine drug by activated charcoal powder impregnated with hydrogen peroxide (IAC) to improve its surface properties was investigated. The investigation also aimed to assess the effect of the repeated dose in increasing the amount of the drug adsorbed. The powder activated charcoal was impregnated with H2O2 3%. The effects of pH of the solution, concentration of the drug and time of the reaction parameters were investigated by using UV-Vis spectroscopy. The IAC was brought in contact with the drug solution in different pH (2, 4, 7 and 9), drug concentrations (30, 60, 90 and 120 µg ml-1) and time (15, 30, 45 and 60 minutes). After each experiment, a repeated dose of IAC was introd

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref