Preferred Language
Articles
/
jkmc-592
Modified alvarado scoring system. How much helpful?
...Show More Authors

Background:-The Modified Alvarado Scoring System (MASS) has been reported to be a cheap and quick diagnostic tool in patients with acute appendicitis. However, differences in diagnostic accuracy have been observed if the scores were applied to various populations and clinical settings.
Objectives:- The purpose of this study was to evaluate the diagnostic value of Modified Alvarado Scoring System in patients with acute appendicitis in our setting.
Methods:-one hundre twenty eight patients ,were included in this study, admitted to Al-Kindy teaching hospital from June 2009 to June 2010. Patients’ age ranged from 8 to 56 years (21±10) they were divided into three groups; paediatrics, child bearing age females & adult males,. MASS was calculated for each patient included as the diagnosis & treatment were done on the bases of surgeon's clinical decision,confirmation was done by histopathological examination. Finally statistics done included negative appendectomy rate, sensitivity,specificity,positive predictive value,negative predictive value & accuracy.
Results:- Our negative appendectomy rate was 19.5% (22.22% for paediatrics 40.9% for females 4.2% for males). MASS showed sensitivity of 61%(92.8% for paediatrics 38% for females & 58% for males), specificity 80% (75% for paediatrics 88% for females & 50% for males), positive predictive value 92%(92.8% for paediatrics 83% for females 50% for males), negative predictive value 33% ( 75%for paediatrics 50% for females 5% for males) & accuracy 65% ( 88.9% for paediatrics 59% for females 58% for males).
Conclusion:- MASS was of limited help to junior doctors in our setting,clinical assessment & experience are still the gold standard for acute appendicitis.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Mathematical Modeling of Glucose Regulation System in Term of Perturbed Coefficients
...Show More Authors

In this research a recent developed practical modeling technique is applied for the glucose regulation system identification. By using this technique a set of mathematical models is obtained instead of single one to compensate for the  loss of information caused by the optimization technique in curve fitting algorithms, the diversity of members inside the single set is interpreted in term of restricted range of its parameters, also a diagnosis criteria is developed for detecting any disorder in the glucose regulation system by investigating the influence of variation of the parameters on the response of the system, this technique is applied in this research practically  for 20 cases with association of  National Center for

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Performance Enhancement of a Piezoelectric Harvester Included into an Autonomous System
...Show More Authors

Autonomous systems are these systems which power themselves from the available ambient energies in addition to their duties. In the next few years, autonomous systems will pervade society and they will find their ways into different applications related to health, security, comfort and entertainment. Piezoelectric harvesters are possible energy converters which can be used to convert the available ambient vibration energy into electrical energy. In this contribution, an energy harvesting cantilever array with magnetic tuning including three piezoelectric bimorphs is investigated theoretically and experimentally. Other than harvester designs proposed before, this array is easy to manufacture and insensitive to manufacturi

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Dynamic Fault Tolerance Aware Scheduling for Healthcare System on Fog Computing
...Show More Authors

 Internet of Things (IoT) contributes to improve the quality of life as it supports many applications, especially healthcare systems. Data generated from IoT devices is sent to the Cloud Computing (CC) for processing and storage, despite the latency caused by the distance. Because of the revolution in IoT devices, data sent to CC has been increasing. As a result, another problem added to the latency was increasing congestion on the cloud network. Fog Computing (FC) was used to solve these problems because of its proximity to IoT devices, while filtering data is sent to the CC. FC is a middle layer located between IoT devices and the CC layer. Due to the massive data generated by IoT devices on FC, Dynamic Weighted Round Robin (DWRR)

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 16 2016
Journal Name
Journal Of Earthquake Engineering
Dynamic Response of Saturated Soil - Foundation System Acted upon by Vibration
...Show More Authors

In this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured to simulate steady state harmonic load at different operating frequencies. Total of 84 physical models were performed. The footing parameters are related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were tested at the surface and at 50 mm depth below model surface. Meanwhile the investigated parameters of the soil condition include dry and saturated sand for two relative densities 30% and 80%. The response of the footing was ela

... Show More
View Publication
Crossref (25)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Developing System of Solid Waste Management (Applied Research in Hilla City)
...Show More Authors

Abstract

The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Practice & Opinion of Doctors in Hospitals toward Referral System in Iraq
...Show More Authors

Background: Primary Health care (PHC) is unanimous to be the cornerstone of a person-centered health system. While the adoption of a well-function, two-way, and organized referral system is the mainstay in the development of an efficient healthcare delivery system.  

Objective: To Assess the practice & opinion of doctors in the hospitals toward the referral system.  to determine the doctors in the hospital's commitment to referral system instructions and guidelines.

Subjects and Methods: A cross-sectional study with analytic elements was conducted in nine Iraqi governorates. Eight doctors from each health directorate, resulting in a tot

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
Choosing Appropriate Distribution ‏‎by Minitab’s 17 Software to Analysis System Reliability
...Show More Authors

This research aims to choose the appropriate  probability ‎ distribution  ‎‏‎ to the reliability‎        analysis‎ for  an   item through ‎ collected data for operating and stoppage  time of  the case  study.

    Appropriate choice for .probability distribution   is when  the data look to be on or  close the form fitting line for probability plot and test the data  for  goodness of fit .

     Minitab’s 17 software  was used ‎  for this  purpose after  arranging collected data and setting it in the the program‎.

 &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref