Preferred Language
Articles
/
jkmc-13
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of Identification of RLN on decreasing the incidence of the nerveinjury .The benefits of identification of RLN evaluated in each procedure ofthyroidectomy which were total thyroidectomy (TT), near totalthyroidectomy (NTT), and subtotal thyroidectomy (STT).Patients were followed up monthly for 6 months by indirect laryngoscopy for mobility of the vocal cords.

Results: 132 patients underwent thyroidectomy,258 RLNswere at risk, 124 nerves were  identified and134 nerves were  not identified,1 RLN was injured in identified group, and  8 RLN were injured in non-identified group. The pvalue was (0.0393) which was significant. TT were performed for 56 patients (42.4%) and total hemi thyroidectomy(THT)  for 6patients(4.5%), there were 118 RLNs at risk, 64RLNs were identified and 54 RLNs were not identified.1RLN was injured in identified group, and 7RLNs were injured in non-identifiedgroup, the pvalue was(0.023)which was significant.NTT procedure were performed for 38 patients(28.8%) , 76 RLNs were at risk. 30 RLNswere identified and none of themwas injured, 46 RLNswere not identified, 1 RLN was injured the p value was(1)which was not significant.STT were performed for 32patients(24.4%),64 RLNs were at risk. 30 RLNs were  identified  and 34 RLNs not identified,there was no nerve injury in both groups .

Conclusions: identification of RLN decrease incidence of RLNI in TT, while there was no significant increase of RLNI in NTT and STT when the nerve was not identified

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Preparation, Spectroscopy, Biological Activities and Thermodynamic Studies of New Complexes of Some Metal Ions with 2-[5-(2-Hydroxy-Phenyl)- 1,3,4-Thiadiazol-2-Ylimino]-Methyl-Naphthalen-1-Ol]
...Show More Authors

This study describes the preparation of new series of tetra-dentate N2O2 dinuclear complexes (Cr3+, Co2+, Cu2+) of the Schiff base derived from condensation of 1-Hydroxy-naphthalene-2-carbaldehyde with 2-amino-5-(2-hydroxy-phenyl)-1,3,4-thiadiazole. The structures of the ligands were identified using IR, UV-Vis , mass,  elemental analysis and 1H-NMR techniques. All prepared complexes have been characterized by conductance measurement, magnetic susceptibility, electronic spectra, infrared spectrum, theromgravimatric analysis (TGA) and metal analysis by atomic absorption. From stoichiometry of metal to ligand and all measurements show a octahedral geometry proposed for all complexes of the (Cr3+, Co2+, Cu2+). conductivity measurement shows t

... Show More
Publication Date
Mon Apr 10 2017
Journal Name
Al-mustansiriyah Journal Of Science
Synthesis, characterization and antibacterial Evaluation for mixed-ligand Complexes of Nickle (II), Manganese(II), Copper( II),Cobalt(II) and Mercury(II) with Tetradentate Schiff base and 1,10-phenanthroline
...Show More Authors

An abstract is a brief summary of a research article, thesis, Schiff base ligand (L) was prepared by the reaction of 4-aminantipyrine with o-phenylenediamine, the prepared ligand characterized by Micro elemental Analysis, FT. IR, UV-Vis, and 1H,13C-NMR spectroscopy.complexes of Mn(II), Co(II), Ni(II), Cu(II) and Hg(II) with Schiff base and 1,10-phenanthroline (Phen) have been investigated in aqueous ethanol with (1:1:1) (M:L:Phen). The prepared complexes were characterized using flame atomic absorption, (C. H. N) Analysis, FT. IR and UV-Vis spectroscopic methods as well as magnetic susceptibility and conductivity measurements. From the obtained data the octahedral structure was suggested for all complexes. The biological screening effects o

... Show More
Publication Date
Wed Jan 25 2012
Journal Name
Synthesis, Characterization And Antibacterial Activities Of Some Metal (ii) Heterocyclic Polyamine Complexes With 6,6'-(1,4-phenylenebis(azanediyl) Bis(2- Amino-6-methyl-6h-1,3-oxazin-4-ol) Ligand.
Synthesis, characterization and Antibacterial activities of some metal (II) heterocyclic polyamine complexes with 6,6'-(1,4-phenylenebis(azanediyl) bis(2-amino-6-methyl-6H-1,3-oxazin-4-ol) ligand.
...Show More Authors

Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program to Improve some Aspects of Sensory Integration Disorder and Its Effect on Self-Direction Among a Sample of Children with Intellectual Disabilities
...Show More Authors

The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 08 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Recurrence Rate of Pleomorphic Adenoma in Minor Salivary Glands After Surgical Excision: A Retrospective Clinical Study
...Show More Authors

Background: Pleomorphic adenoma of the minor salivary gland is a rare benign tumor. It commonly occurs in the hard and soft palates. Treatment by surgical excision achieved success in improving the patient’s health. Objective: To evaluate the recurrence rate after surgical treatment of pleomorphic adenoma in minor salivary glands. Methods: This retrospective study included patients who attended the Maxillofacial Surgery Unit in Ghazi Al-Hariri Hospital, Baghdad, from 2019 to 2021, complaining of soft tissue lumps involving the soft and hard palate, buccal mucosa, and upper lip. After the provisional diagnosis of these lesions, a total surgical excision of the tumor with a safe margin of 1 mm was performed, and the biopsy was sent

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Formal and Functional Perspectives in the Analysis of Hyperboles in Obama's Speeches
...Show More Authors

     Hyperbole is an obvious and intentional exaggeration in the sense that it takes things to such an extreme that the audience goes too far and then pulls itself back to a more reasonable position, i.e. it is an extravagant statement or figure of speech not intended to be taken literally. This paper focuses on the formal and functional perspectives in the analysis of hyperbole which American candidates produce in their speeches in electoral campaigns, for it is hypothesized that candidates in their electoral campaigns use hyperbolic expressions excessively to persuade voters of the objectives of their electoral campaign programs. Hence, it aims to analyze hyperbole in context to determine the range of pragmatic func

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
Effect of Thyroid Hormone Abnormalities on Hemoglobin A1c in Hemodialysis Patients Taking Erythropoietin
...Show More Authors

Background: Hemoglobin A1c (HbA1c) is a widely used test for glycemic control. It is done for chronic kidney disease (CKD) patients. Renal disease is accompanied by thyroid abnormalities, which affect HbA1c, especially in those taking erythropoiesis-stimulating agents (ESAs). We aimed to find the effect of thyroid dysfunction on HbA1c in hemodialysis patients taking ESAs and those who do not. Materials and Method: Fifty six patients were included in this study, which was done between September 2017 and June 2018, in Baghdad Teaching Hospital. Thyroid stimulating hormone, free T3, free T4 and HbA1c measurements were done. The patients were divided into 2 groups; those who took ESAs and those who did not, then they were subdivided into those

... Show More
View Publication Preview PDF