Background: Thyroid surgery is most common endocrine surgery in general surgical practice. Objectives: the aim of this work is to evaluate the feasibility, benefits and outcomes of open mini-incision thyroidectomy and compared the results with that of conventional thyroidectomy. The comparison between the two groups was in term of incision length, amount of blood loss, time of operation, postoperative pain, hospital stay and the cosmetic outcomes.Type of the study: this is a single-blinded randomized controlled studyMethods: This study compared the advantages and outcomes of 22 patients subjected to mini-incision thyroidectomy (Group A) with the equal numbers of patients subjected to conventional thyroidectomy (Group B).Results: the operative time was statistically longer in minithyroidectomy than with conventional thyroidectomy. Postoperative pain score in the operative day and 24 hours postoperatively showed a significant difference in favor of mini-incision thyroidectomy. The cosmetic outcome and patients satisfaction was significantly and far better in minithyroidectomy group. The results between both groups were comparable regarding the postoperative complications. The hospital stay was shorter in the mini-incision group than in conventional group but the difference was not significant.Conclusions: mini-incision thyroidectomy is simple, safe and practical procedure that achieves the same results and the rate complications to the conventional thyroidectomy with less post operative pain and better aesthetic results. It is easily converted to conventional technique when necessary without added risks .
In this research and by using the concept of , a new set of near set which is nano-Ἷ-semi-g-closed set was defined. Some properties and examples with illustrative table and an applied example were presented.
The aim of this paper is to introduce a new type of proper mappings called semi-p-proper mapping by using semi-p-open sets, which is weaker than the proper mapping. Some properties and characterizations of this type of mappings are given.
The aim of this study is to compare the effects of three methods: problem-based learning (PBL), PBL with lecture method, and conventional teaching on self-directed learning skills among physics undergraduates. The actual sample size comprises of 122 students, who were selected randomly from the Physics Department, College of Education in Iraq. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The data was analyzed and statistical results rejected null hypothesis of this study. This study revealed that there are no signifigant differences between PBL and PBL with lecture method, thus the PBL without or with lecture method enhances the self-directed learning skills bette
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreOne of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show MoreIn this paper, we shall introduce a new kind of Perfect (or proper) Mappings, namely ω-Perfect Mappings, which are strictly weaker than perfect mappings. And the following are the main results: (a) Let f : X→Y be ω-perfect mapping of a space X onto a space Y, then X is compact (Lindeloff), if Y is so. (b) Let f : X→Y be ω-perfect mapping of a regular space X onto a space Y. then X is paracompact (strongly paracompact), if Y is so paracompact (strongly paracompact). (c) Let X be a compact space and Y be a p*-space then the projection p : X×Y→Y is a ω-perfect mapping. Hence, X×Y is compact (paracompact, strongly paracompact) if and only if Y is so.
Objective: To assess the effect of six-minute walk test on health-related quality of life in patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases. Material: This descriptive study was conducted from 8th August, 2022 to 10th January, 2023. A non-probability purposive sample of 50 patients undergoing coronary artery bypass graft surgery at Iraqi center for heart diseases was included in the study. A questionnaire composed of three parts; sociodemographic and clinical data, six-minute walk test (6MWT) and health-related quality of life (HRQoL) were used. SPSS version 26 was utilized to analyze data. Results: Patient’s performance showed highly significant statistical differences at p<0.05 betw
... Show MoreUnlike fault diagnosis approaches based on the direct analysis of current and voltage signals, this paper proposes a diagnosis of induction motor faults through monitoring the variations in motor's parameters when it is subjected to an open circuit or short circuit faults. These parameters include stator and rotor resistances, self-inductances, and mutual inductance. The genetic algorithm and the trust-region method are used for the estimation process. Simulation results confirm the efficiency of both the genetic algorithm and the trust-region method in estimating the motor parameters; however, better performance in terms of estimation time is obtained when the trust-region method is adopted. The results also show the po
... Show MoreFacial identification is one of the biometrical approaches implemented for identifying any facial image with the use of the basic properties of that face. In this paper we proposes a new improved approach for face detection based on coding eyes by using Open CV's Viola-Jones algorithm which removes the falsely detected faces depending on coding eyes. The Haar training module in Open CV is an implementation of the Viola-Jones framework, the training algorithm takes as input a training group of positive and negative images, and generates strong features in the format of an XML file which is capable of subsequently being utilized for detecting the wanted face and eyes in images, the integral image is used to speed up Haar-like features calc
... Show MoreThe current research aims to identify the impact of ambidextrous leadership behaviors on organizational energy in Al-Faris Company. The descriptive analytical method was used as a research approach. Adept leadership includes two dimensions (open leadership behaviors and closed leadership behaviors), and organizational energy includes three dimensions (emotional energy, physical energy, and cognitive energy ). The research sample included all the administrative leaders (General Manager, Associate General manager, Department Manager, Division Official ) in AL-Faris Company / the Iraqi Ministry of Industry. The researcher distributed (74) valid questionna
... Show More