ABSTRACTBackground: cochlear implants are electronic devices that convert sound energy into electrical signals to stimulate ganglion cells and cochlear nerve fibers. These devices are indicated for patients with severe to profound sensorineural hearing losses who receive little or no benefit from hearing aids. The implant basically takes over the function of the cochlear hair cells. The implant consists of external components (microphone, speech processor and transmitting coil) and internal components (receiver stimulator and electrode array). The implant is inserted via a trans mastoid facial recess approach to the round window and scala tympani.Objectives: to determine the effectiveness and safety of non fixation method in cochlear implantation.Methods: a prospective study carried out from September 2009 to September 2012 in Gazi Hariri Hospital. Eighty patients with congenital severe –profound sensorineural hearing loss prepared for cochlear implantation involved in the study and divided into 2 groups. Group A includes 40 patients in whom the internal device was fixed to the skull by nylon suture materials through small burr holes on both sides of the well. Group B includes 40 patients in whom the internal device placed in a tight sub pericranial pocket without nylon fixation to the skull. All patients followed postoperatively for 6 months observing wound healing and local complications (hematoma, infection, wound dehiscence, device extrusion and migration).Results: mean age 4.2 years and male-female ratio was 1.3:1.Group A: 1 patient (2.5%) developed minor wound infection treated conservatively. Three patients (7.5%) developedsevere wound infection with wound breakdown and device extrusion despite the use of antibiotics and local rotational flaps, the device was explanted in those 3 patients. Two patients (5%) developed hematoma without history of trauma and treated conservatively. One patient (2.5%) had device migration without affection of its function.Group B: 2 patients developed minor wound infection treated conservatively. One patient (2.5%) had severe wound infection ends up with wound dehiscence and device extrusion despite the use of antibiotics and local rotational flaps. Explantation of the device was done for this patient. Hematoma occurred in one patient (2.5%) without history of trauma and treated conservatively. Another one patient (2.5%) developed device migration without impairment of its function.Conclusion: creation of sub pericranial pocket without internal device fixation by nylon materials is an effective and reliable method in cochlear implantation without compromising the patient safety or device performance.Key words: cochlear implantation, non- fixation, sub pericranial pocket
Abstract:
Objective: The study’s aim to evaluate the effectiveness of instructional program about healthy lifestyle on patients’ attitudes after undergoing percutaneous coronary intervention.
Methodology: Quasi-experimental design/ has been utilized for the current study starting from December 2018 to March 2020 to achieve the objectives of the study. Non-probability (purposive) sample of 60 patients was divided into intervention and control groups. Data were analyzed by the application of descriptive and inferential statistical methods.
Results: findings reported that before intervention both study and control groups demonstrated low total mean of score relat
... Show MoreObjectives: the study aims to assess nurses' practices toward chemotherapy-induced peripheral neuropathy (CIPN) for children at the hematology center, and to determine the effectiveness of the health education program on nurses' practices toward CIPN, and to find out the relationships between the effectiveness of Health education program and demographic characteristics of nurses.
Methodology: Use quasi-experimental design in the study (a design that divides the sample into two groups, a study group and a control group, with data collection in three stages). This study was conducted at a hematology center in Baghdad city for the period (from December 16th, 2019 to 8th May 202
... Show MoreObjective: Determination the effectiveness of educational program on female students’ practices toward premenstrual.
Methodology: A quasi-experimental design study was conducted involving (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criteria to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the practices, before the implementation of the program, the second step is implementing the program, following two steps post-test I and II betwe
... Show MoreThe Mishrif Formation is one of the most important geological formations in Iraq consisting of limestone, marl, and shale layers since it is one of the main oil producing reservoirs in the country, which contain a significant portion of Iraq's oil reserves. The formation has been extensively explored and developed by the Iraqi government and international oil companies, with many oil fields being developed within it. The accurate evaluation of the Mishrif formation is key to the successful exploitation of this field. However, its geological complexity poses significant challenges for oil production, requiring advanced techniques to accurately evaluate its petrophysical properties.
This study used advanced well-logging analysi
... Show MoreIn this paper, a new approach was suggested to the method of Gauss Seidel through the controlling of equations installation before the beginning of the method in the traditional way. New structure of equations occur after the diagnosis of the variable that causes the fluctuation and the slow extract of the results, then eradicating this variable. This procedure leads to a higher accuracy and less number of steps than the old method. By using the this proposed method, there will be a possibility of solving many of divergent values equations which cannot be solved by the old style.
This research is qualitative in nature. It aims to investigate descriptively, analytically, and comparatively the modern AK model represented by the Sudan Open University Series, and the European framework, the common reference for Teaching Foreign Languages, to uncover what was achieved in them in terms of communication and language use. Accordingly, an integrated, multi-media approach has been adopted to enable the production and reception activities, and the spread of Arabic in vast areas of the world. Such a spread helps Arabic language to be in a hegemonic position with the other living languages. The study is based on getting benefit from human experiences and joint work in the field of teaching Arabic to non-Arabic speakers to mee
... Show MoreBackground: Many countries recommend the use of long-acting reversible contraceptive intrauterine device immediately after cesarean delivery. The cesarean delivery rate in Iraqi public hospitals is 32.2% and may reach 85.8% in private hospitals. Immediate post-partum intrauterine device insertion at cesarean is rarely done in Iraq.
Objectives: To assess the safety and practicality of immediate post-partum intrauterine device insertion during cesarean delivery for family planning and pregnancy spacing in Iraqi women.
Subjects and Methods: A single arm clinical trial included 150 eligible women who attended Al-Elwiyah Maternity Teaching Hospital or Al Hayat Rahibat Hospita
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More