Preferred Language
Articles
/
jkmc-13
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of Identification of RLN on decreasing the incidence of the nerveinjury .The benefits of identification of RLN evaluated in each procedure ofthyroidectomy which were total thyroidectomy (TT), near totalthyroidectomy (NTT), and subtotal thyroidectomy (STT).Patients were followed up monthly for 6 months by indirect laryngoscopy for mobility of the vocal cords.

Results: 132 patients underwent thyroidectomy,258 RLNswere at risk, 124 nerves were  identified and134 nerves were  not identified,1 RLN was injured in identified group, and  8 RLN were injured in non-identified group. The pvalue was (0.0393) which was significant. TT were performed for 56 patients (42.4%) and total hemi thyroidectomy(THT)  for 6patients(4.5%), there were 118 RLNs at risk, 64RLNs were identified and 54 RLNs were not identified.1RLN was injured in identified group, and 7RLNs were injured in non-identifiedgroup, the pvalue was(0.023)which was significant.NTT procedure were performed for 38 patients(28.8%) , 76 RLNs were at risk. 30 RLNswere identified and none of themwas injured, 46 RLNswere not identified, 1 RLN was injured the p value was(1)which was not significant.STT were performed for 32patients(24.4%),64 RLNs were at risk. 30 RLNs were  identified  and 34 RLNs not identified,there was no nerve injury in both groups .

Conclusions: identification of RLN decrease incidence of RLNI in TT, while there was no significant increase of RLNI in NTT and STT when the nerve was not identified

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
FACE IDENTIFICATION USING BACK-PROPAGATION ADAPTIVE MULTIWAVENET
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Face Identification Using Back-Propagation Adaptive Multiwavenet
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2023
Journal Name
2023 3rd International Conference On Intelligent Cybernetics Technology & Applications (icicyta)
GPT-4 versus Bard and Bing: LLMs for Fake Image Detection
...Show More Authors

The recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Italian Journal Of Vascular And Endovascular Surgery
Retroperitoneal versus transperitoneal approach for aortoiliac occlusive disease: a comparative study
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
World Journal Of Pharmaceutical Research
IDENTIFICATION OF SOME SPECIES OF WIREWORM AGRIOTES SPP. (COLEOPTERA: ELATERIDAE) IN BAGHDAD
...Show More Authors

Publication Date
Wed Mar 16 2016
Journal Name
World Journal Of Pharmaceutical Research
Identification of some species of wireworm Agriotes spp.(Coleoptera: Elateridae) in Baghdad
...Show More Authors

Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Isolation and identification of polyhydroxyalkanoates producing bacteria from biopolymers waste in soil
...Show More Authors
Abstract<p>The production of polyhydroxyalkanoates PHAs from biopolymer degrading bacteria was examined <italic>in situ</italic> by screening isolates using Sudan B Black staining process as potential PHAs detecting, and Nile Blue staining as a proof method detection. Five bacterial strains isolated from biopolymer waste buried in a garden soil were able to produce high rate of PHA. <italic>AK1P</italic> and <italic>AK2P</italic> strains demonstrated high productivity of biopolymer by converting 5% (w/v) lactose as the only carbon source to PHA during fermentation. <italic>AY2P</italic> strain converted 5% (w/v) of glucose with less PHA accumulation. The f</p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 09 2023
Journal Name
Buildings
Identification of Desired Qualifications for Construction Safety Personnel in the United States
...Show More Authors

Construction is a hazardous industry with a high number of injuries. Prior research found that many industry injuries can be prevented by implementing an effective safety plan if prepared and maintained by qualified safety personnel. However, there are no specific guidelines on how to select qualified construction safety personnel and what criteria should be used to select an individual for a safety position in the United States (US) construction industry. To fill this gap in knowledge, the study goal was to identify the desired qualifications of safety personnel in the US construction industry. To achieve the study goal, the Delphi technique was used as the main methodology for determining the desired qualifications for constructio

... Show More
View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Identification of the main causes of risks in engineering procurement construction projects
...Show More Authors
Abstract<p>Many risks have adverse consequences for construction projects’ objectives such as quality, schedule, and cost. As engineering procurement construction (EPC) contracts gradually become one of the most common types used in implementing major large-scale construction projects, identifying common risk types and analyzing their root causes is important for developing measures to decrease and eliminate future risks in these types of contracts. The information about the main causes of risks was collected <italic>via</italic> well-structured questionnaires addressed to construction sector professionals and preparing lists of main potential risks in EPC/construction projects throu</p> ... Show More
View Publication
Crossref (3)
Crossref