Background:-The Modified Alvarado Scoring System (MASS) has been reported to be a cheap and quick diagnostic tool in patients with acute appendicitis. However, differences in diagnostic accuracy have been observed if the scores were applied to various populations and clinical settings.
Objectives:- The purpose of this study was to evaluate the diagnostic value of Modified Alvarado Scoring System in patients with acute appendicitis in our setting.
Methods:-one hundre twenty eight patients ,were included in this study, admitted to Al-Kindy teaching hospital from June 2009 to June 2010. Patients’ age ranged from 8 to 56 years (21±10) they were divided into three groups; paediatrics, child bearing age females & adult males,. MASS was calculated for each patient included as the diagnosis & treatment were done on the bases of surgeon's clinical decision,confirmation was done by histopathological examination. Finally statistics done included negative appendectomy rate, sensitivity,specificity,positive predictive value,negative predictive value & accuracy.
Results:- Our negative appendectomy rate was 19.5% (22.22% for paediatrics 40.9% for females 4.2% for males). MASS showed sensitivity of 61%(92.8% for paediatrics 38% for females & 58% for males), specificity 80% (75% for paediatrics 88% for females & 50% for males), positive predictive value 92%(92.8% for paediatrics 83% for females 50% for males), negative predictive value 33% ( 75%for paediatrics 50% for females 5% for males) & accuracy 65% ( 88.9% for paediatrics 59% for females 58% for males).
Conclusion:- MASS was of limited help to junior doctors in our setting,clinical assessment & experience are still the gold standard for acute appendicitis.
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed
... Show MoreThe main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreMalaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreAbstract
Documentary credits are considered successful means to reduce imports, especially unnecessary imports that lead to the outflow of foreign currency from the country. However, due to the backwardness of the banking methods, the reintroduction of documentary credits after 2003 did not effectively contribute to reducing import rates. This has had a negative impact on the Iraqi economy and made it vulnerable to external markets. Documentary credits are also considered the best way to ensure payment in international trade, providing independent credit support and sufficient security for exporters and importers against commerci
... Show More