Preferred Language
Articles
/
jkmc-40
Evaluation of Ultrasonography in the Diagnosis of Acute Appendicitis with Histopathology as Gold Standard
...Show More Authors

Background: Acute appendicitis is the most common surgical abdominal emergency with a life time prevalence of 1 to 7 individuals. Because the clinical diagnosis of acute appendicitis remains a challenge to surgeons, so different aids were introduced like different scoring systems, computer aided programs, ultrasonography, computerized tomography, Magnetic resonance imaging, Gastrointestinal tract contrast studies and laparoscopy to improve the diagnostic accuracy.

Objective: To evaluate ultrasound in the diagnosis of acute appendicitis in those patients clinically diagnosed with histopathology as gold standard.

Methods: A cross sectional study carried in Al-kindy Teaching Hospital through one year duration from 1st of may2015 to1st of May 2016. All included patients were subjected to ultrasonographic examination to assess the vermiform appendix with a graded compression technique. The Ultrasonography findings were recorded as positive and negative for acute appendicitis.

All the appendices removed from the study patients were sent for histopathological study. Statistical analysis done using (SPSS) version 21, Chi-sequare test used for categorical variables and t-test was used to compare between two means. Level of significance (P value) set at ≤ 0.05.

Results: A total of 215 patients with suspected appendicitis, males 112 (52.09%) and females 103(47.9%) were included in present study. The validity results of ultrasound in comparison with histopathology findings were as following; accuracy 86.5%, sensitivity 86.5%, specificity 86.6%, positive predictive value 99.8% and negative predictive value 32.5%.

Conclusion: The ultrasonography has a good accuracy, sensitivity and specificity in diagnosing acute appendicitis.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Improve Data Mining Techniques with a High-Performance Cluster
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2025
Journal Name
Radio Science
Integrating Drones With Digital Twins for Aerial Remote Sensing
...Show More Authors
Abstract<p>Drones are highly autonomous, remote‐controlled platforms capable of performing a variety of tasks in diverse environments. A digital twin (DT) is a virtual replica of a physical system. The integration of DT with drones gives the opportunity to manipulate the drone during a mission. In this paper, the architecture of DT is presented in order to explain how the physical environment can be represented. The techniques via which drones are collecting the necessary information for DT are compared as a next step to introduce the main methods that have been applied in DT progress by drones. The findings of this research indicated that the process of incorporating DTs into drones will result in the advanc</p> ... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Oct 06 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
Encased Pultruded GFRP Beams with Shear Connectors: A Review
...Show More Authors

This study examines the structural performance of concrete-encased pultruded Glass Fiber Reinforced Polymer (GFRP) I-sections with shear connections. It specifically focuses on how different parameters affect the latter’s ductility, flexural strength, and load-carrying capacity. The key variables studied include various shear connector types, spacing, and geometries, as well as the compressive strength of concrete and the properties of GFRP. The finite element modeling and experimental validation show that the shear connectors significantly improve the ductility, ultimate capacity, and load transmission efficiency. The present review emphasizes that the shear connectors greatly enhance the structural performance when they are prop

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Gelatin Grafted Methyl Nadic Anhydride and Substitution With Salbutamol
...Show More Authors

Gelatin a promising biomaterial which is useful and interesting natural polymer which offer possibilities of chemical modification through grafted copolymerization with an saturated acid anhydride such as methyl nadic anhydride formatted gelatin –g- methyl nadic anhydride copolymer (A1), then modified to its corresponding polymer (A2) by substituted salbutamol as useful derivative as biomaterial .the prepared drug biopolymer was characterization by FTIR spectroscopy and thermal analysis was studied controlled drug release was measured in different buffer solution at 37C0 .

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
International Journal Of Applied Engineering Research
Tendon Type Robotic Gripper with Frictional Self-Locking Mechanism
...Show More Authors

This research considers a proposed mechanism relying on frictional interactions between the grasped object and the gripper, thus attaining a case of self-locking condition for a tendon type robotic gripper. A mathematical model was derived for this proposed mechanism, upon which a special purpose apparatus was fabricated and tested. Both results, theoretically and experimentally, are in good agreement, showing that the weight of the grasped object played a major role in attaining the self-locking condition.

View Publication Preview PDF
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 03 2025
Journal Name
Internationaljournalof Economicsandfinancestudies
CROSS-SECTIONAL REGRESSION WITH PROXIES: A SEMI-PARAMETRIC METHOD
...Show More Authors

This study investigates asset returns within the Iraq Stock Exchange by employing both the Fama-MacBeth regression model and the Fama-French three-factor model. The research involves the estimation of cross-sectional regressions wherein model parameters are subject to temporal variation, and the independent variables function as proxies. The dataset comprises information from the first quarter of 2010 to the first quarter of 2024, encompassing 22 publicly listed companies across six industrial sectors. The study explores methodological advancements through the application of the Single Index Model (SIM) and Kernel Weighted Regression (KWR) in both time series and cross-sectional analyses. The SIM outperformed the K

... Show More
View Publication
Scopus