Preferred Language
Articles
/
jkmc-555
MODIFICATION OF TUBULARIZED INCISED PLATE URETHROPLASTY IN HYPOSPADIUS REPAIR FOR PREVENTING FISTULA AND MEATAL STENOSIS.
...Show More Authors

Objective: to evaluate the benefit of coverage of
the urethral repair by dorsal dartos flap as a second
layer for preventing fistula and V like incision on
the tip of the glans for preventing meatal stenosis.
Patients and Methods:
Forty five children included in this study age
ranged ( 11 months – 7 years), they underwent
hypospadias repair between December 2008 to
March 2012, all cases with distal hypospadias,
same technique used for all patients, a combination
of techniques used for reconstruction starting
withtubularized incised plate urethroplasty with deepithelialized
or stripping of the skin from both
sides of U shaped incision surrounding the urethral
plate, adding a V like incision on the top (tip of
glans) of the midline urethral plate incision that
give wide meatus subsequently prevent meatal
stenosis and no need for dilatation after stent
removal, followed by harvesting well vascularized
dartos flap from de-epithelialized preputial skin
and transposing itventrally by buttonholing
maneuver and suturing the flap as a second layer
along the neourthral suture line, finally
approximation of glans , so achieving three layer
closure.
Results :All patients are followed for (6 months-
24 months) mean was 15 months, only two patients
(4.4%) complicated with small fistula at the
subcoronal region at the beginning of the study
operated after 6 months and the fistula closed
successfully. Twenty five cases (55.5%) with
Chordee were completely released with no
recurrence. No dilatation was needed after removal
of stent for neomeatus developed a good stream of
urine with no problems regarding stenosis.
Conclusions: In this study hypospadias repair
should achieve three layer closures by using a
dartosfalp as a second layer to cover neourethral
suture line combined with stripping the skin on the
edge of the U shaped incision to gain secure
closure of the neourethra, which will prevent
fistula formation. We recommend adding a
Vincision on the tip of the glans connected with
midline urethral plate incision to prevent meatal
stenosis.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Predicting the Sporting Achievement in the Pole Vault for Men Using Artificial Neural Networks
...Show More Authors

The physical sports sector in Iraq suffers from the problem of achieving sports achievements in individual and team games in various Asian and international competitions, for many reasons, including the lack of exploitation of modern, accurate and flexible technologies and means, especially in the field of information technology, especially the technology of artificial neural networks. The main goal of this study is to build an intelligent mathematical model to predict sport achievement in pole vaulting for men, the methodology of the research included the use of five variables as inputs to the neural network, which are Avarage of Speed (m/sec in Before distance 05 meters latest and Distance 05 meters latest, The maximum speed achieved in t

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Bowel Cleansing Quality in Morning Versus Evening Preparation Regimens for colonoscopy; a Prospective Study
...Show More Authors

Background :Evening preparation for colonoscopy is often unsatisfactory and inconvenient. This study was performed to compare the efficacy of bowel preparation at two different timings: night before and morning of endoscopy and to compare the cecal intubation rate and disturbance of sleep hours between these two groups.
Methods: In this prospective randomized endoscopist- blinded trial, 150 patients were enrolled between March 2010 and August 2011. Patients aged between 18 to 80 years needing colonoscopy were included. Patients with prior bowel surgery, suspected bowel obstruction or those who didn't completely fulfill the preparation instructions were excluded. Patients received polyethyelen glycol electrolyte preparation in a mornin

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
“Using the Statistical Analysis for deduction the childhood status in Iraq during 2006-2010”
...Show More Authors

   To deduct the childhood status in Iraq, it was important manner to use statistical tools and approaches concerned with interpreting the causal relationships and their attitudes and use classification method for the important effects (variables) to draw an obvious picture of the phenomena under study in order to make it useful through investing, updating and improving it in by demographic studies in the future. Two statistical methods had been used in the field of analyzing data of multivariate analysis namely, Cluster Analysis and Factor Analysis.  

The present study focuses on four fundamental axes .The nutrition axis, health axis, Educational axis, and the social axis. The study has ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 26 2022
Journal Name
Petroleum Science And Technology
Building 3D geological model using non-uniform gridding for Mishrif reservoir in Garraf oilfield
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Design Technologies in Promoting the Advertisement for National Product: وسام عبد الامير كريم المالكي
...Show More Authors

The current research is concerned with studying the variables in the promotion process which influence the advertisement design structure, as the accomplished design and construction process is subject to many variables, whether they were intellectual or technological, internal or external variables. These variables may overlap in order to get a comprehensive system for the artistic configuration, that any design in its content reaches the highest levels of perfection is connected to the extent of its compliance with and approximation to these variables, that is why we find their reflections deeply rooted in the individual's mind, especially the designer artist who is influenced by everything surrounding him forming knowledge systems res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (64)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
A modified Mobilenetv2 architecture for fire detection systems in open areas by deep learning
...Show More Authors

This research describes a new model inspired by Mobilenetv2 that was trained on a very diverse dataset. The goal is to enable fire detection in open areas to replace physical sensor-based fire detectors and reduce false alarms of fires, to achieve the lowest losses in open areas via deep learning. A diverse fire dataset was created that combines images and videos from several sources. In addition, another self-made data set was taken from the farms of the holy shrine of Al-Hussainiya in the city of Karbala. After that, the model was trained with the collected dataset. The test accuracy of the fire dataset that was trained with the new model reached 98.87%.

Scopus Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Narrative Structures in the Novel “Qiamat Baghdad” for the Novelist Alia Talib – Semiotic Study
...Show More Authors

 

Abstract

The human mind knew the philosophy and logic in the ancient times, and the history afterwards, while the semiotics concept appeared in the modern time, and became a new knowledge field like the other knowledge fields. It deals, in its different concepts and references, with the processes that lead to and reveals the meaning through what is hidden in addition to what is disclosed. It is the result of human activity in its pragmatic and cognitive dimensions together. The semiotic token concept became a knowledge key to access all the study, research, and  investigation fields, due to its ability of description, explanation, and dismantling. The paper is divided into two sections preceded by a the

... Show More
View Publication Preview PDF