Preferred Language
Articles
/
jkmc-644
Comparison Between Mechanical and Non Mechanical Bowel Preparation Prior To Elective Colorectal Surgery
...Show More Authors

Background: Bowel preparation prior to
colonic surgery usually includes antibiotic
therapy together with mechanical bowel
preparation which may cause discomfort to the
patients, prolonged hospitalization and water
& electrolyte imbalance.
Objective: to assess whether elective colon
and rectal surgery may be safely performed
without preoperative mechanical bowel
preparation.
Method: the study includes all patients who
had elective large bowel resection at Medical
City – Baghdad Teaching Hospital between
Feb, 2007 to Jan, 2010. Emergency operations
were not included. The patients were randomly
assigned to the 2 study groups (with or without
mechanical bowel preparation.
Results: A total of 165 patients participated
in the study, 82 with mechanical bowel
preparation and 83 without. The 2 groups
were similar in age, sex and type of surgical
procedure. 134 patients (81.2 %) underwent
surgery owing to colorectal cancer & 31
patients (18.8 %) owing to benign disease.
The hospitalization period was longer in the
bowel-prepared group (mean ± SD, 8.2 ± 5.1
days) as compared with the non prepared
group (mean ± SD, 8.0 ± 2.7 days). However,
this difference was not statistically significant.
The time until the 1st bowel movement was
similar between the 2 groups : a mean ± SD of
4.2 ± 1.3 days in the non prepared group as
compared with a men ± SD 4.3 ± 1.1 days in
the prepared group ( P = NS ).
Conclusion: Our results suggest that no
advantage is gained by preoperative
mechanical bowel preparation in elective
colorectal surgery.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Theoretical Study of Thermal Cracking For Acenaphthylene Molecule
...Show More Authors

Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
A complete (48, 4)-arc in the Projective Plane Over the Field of Order Seventeen
...Show More Authors

            The article describes a certain computation method of -arcs to construct the number of distinct -arcs in  for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Solving the Inverse Kinematic Equations of Elastic Robot Arm Utilizing Neural Network
...Show More Authors

The inverse kinematic equation for a robot is very important to the control robot’s motion and position. The solving of this equation is complex for the rigid robot due to the dependency of this equation on the joint configuration and structure of robot link. In light robot arms, where the flexibility exists, the solving of this problem is more complicated than the rigid link robot because the deformation variables (elongation and bending) are present in the forward kinematic equation. The finding of an inverse kinematic equation needs to obtain the relation between the joint angles and both of the end-effector position and deformations variables. In this work, a neural network has been proposed to solve the problem of inverse kinemati

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
The Terrorist Project in Terms of the Agreement
...Show More Authors

Terrorist crime is considered a serious act that outweighs all other crimes in terms of impact and result, because it has a wide range on societies, and it also contains a great thing of danger represented in its purpose, and here describing terrorism as a crime is a description that does not give the full right to this behavior or that it It abbreviates it and does not show its actual reality, given that terrorism contains several different crimes and the roles of its contributors, and these roles are necessary to reach the result or the end. In which each episode is complementary to the other, it is not a single act, but rather several joint and complex actions that in turn all lead to the result, and the agreement in the terrorist pro

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 03 2013
Journal Name
Al-kindy College Medical Journal
Conservative Treatment of Closed Fracture Shaft Humerus in Adult Patients
...Show More Authors

Background: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of marketing vigilance in attracting deposits: Applied research in a sample of private commercial bank
...Show More Authors

The aim of the research is to demonstrate the impact of the dimensions of the marketing vigilance represented by (environmental scanning, diagnostic capacity, validity and decision-making) and to attract deposits represented by (customer relationship management strategy, distribution strategy (location), promotion strategy), as the research was applied in each of Banks (Assyria International, Iraqi Middle East Investment, Business Bay, Iraqi Investment, Babel, Al Mansour Investment), and the questionnaire was adopted as a main tool for collecting data and information from a sample of (110) who are in the position (department manager, department manager, assistant Section Director, Division Officer, Unit Officer), and the statistical prog

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Iraqi Journal Of Science
On Semiannahilator Supplement Submodules
...Show More Authors

Let R be associative; ring; with an identity and let D be unitary left R- module; . In this work we present semiannihilator; supplement submodule as a generalization of R-a- supplement submodule, Let U and V be submodules of an R-module D if D=U+V and whenever Y≤ V and D=U+Y, then annY≪R;. We also introduce the the concept of semiannihilator -supplemented ;modules and semiannihilator weak; supplemented modules, and we give some basic properties of this conseptes