Preferred Language
Articles
/
jkmc-707
A prospective study of colonoscopic examination at al-kindy teaching hospital
...Show More Authors

Background: Fiber-optic endoscopy is an important
investigation of the large intestine, whether or not the
radiologist (barium enema) has discovered a lesion in
the bowel. Colonoscopy affords a unique opportunity
to direct visualization of entire colonic mucosa. At
the same time, the physician can obtain biopsy specimens, remove polyps, and decompress volvuli.
Most experienced endoscopists and well prepared
patients can reach the cecum in over 90% of patients.
If colonoscopy is properly performed, it has a low
risk of complications, such as perforation and bleeding.
Methods: A total of 70 consecutive patients admitted
to Endoscopy department at Al-Kindy Teaching hospital from September- 2008 to July-2009. Bowel
preparation was achieved with Polyethylene glycol
lavage solution and 165 cm Pentax colonoscope
EC_3385FK 4.2 was used in all cases. All patients
were not sedated or given any other medication
Results:Seventy colonoscopies were performed in
this study. Forty of them were male and the rest were
female. The mean age was 42 years ranging from 4
years to 85 years. The most common indication for
colonoscopy was rectal bleeding (44%) Polyethylene
glycol lavage solution was used in all patients for
bowel preparation. All patients did not receive premedications. Complete colonoscopy examination was
done in (12.8%) of patients, the most common cause
of incomplete examination was poor bowel preparation (50%). No complications were reported.
Conclusions: Rectal bleeding was the most common
indication for colonoscopy. Poor bowel preparation
was the main cause of incomplete colonoscopy

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
A nonlinear edge –preserving smoothing filter for edge detection on color and gray satellite images
...Show More Authors

A nonlinear filter for smoothing color and gray images
corrupted by Gaussian noise is presented in this paper. The proposed
filter designed to reduce the noise in the R,G, and B bands of the
color images and preserving the edges. This filter applied in order to
prepare images for further processing such as edge detection and
image segmentation.
The results of computer simulations show that the proposed
filter gave satisfactory results when compared with the results of
conventional filters such as Gaussian low pass filter and median filter
by using Cross Correlation Coefficient (ccc) criteria.

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Applied Soft Computing
A new evolutionary algorithm with locally assisted heuristic for complex detection in protein interaction networks
...Show More Authors

View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
A New Model Design for Combating COVID -19 Pandemic Based on SVM and CNN Approaches
...Show More Authors

       In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from      Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mass Transfer Correlations for a Rotating Cylinder Electrode under lsothermal and Controlled Heat Transfer Condition
...Show More Authors

Mass transfer correlations for iron rotating cylinder electrode in chloride/sulphate solution, under isothermal and
controlled heat transfer conditions, were derived. Limiting current density values for the oxygen reduction reaction from
potentiostatic experiments at different bulk temperatures and various turbulent flow rates, under isothermal and heat
transfer conditions, were used for such derivation. The corelations were analogous to that obtained by Eisenberg et all
and other workers.

View Publication Preview PDF
Publication Date
Thu Jun 26 2014
Journal Name
Engineering Optimization
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution
...Show More Authors

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Immunoglobulins assessment (IgE,G,A,M) in some Iraqi patients with acute and chronic urticaria
...Show More Authors

60 patients diagnosed as having urticaria were included in the study ; 30 patients were effected with acute urticaria and 30 patients were affected with chronic urticaria. In addition, 30 healthy adult volunteers were selected as control group .The patients and control groups sera were examined with enzyme linked immunosorbent assay ( ELISA) to detect total level IgE and radial immunodiffusion (RID) to detect levels of IgG , IgA and IgM . The total level of IgE in acute urticaria ( 1.45±0.13) IU/mL and chronic urticaria (2.12 ± 0.10) IU/mL patients were significantly higher than the control groups ( 0.85 ± 0.10)IU/mL (p<0.05). The level of IgG in acute urticaria ( 12.5± 0.42) g/L and chronic (13.16±0.40) g/L patients , IgA in acute (2.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath: Fatin Kaleel Ismael
...Show More Authors

A Destructive Parenthood : The Problematic Motherhood in Selected Poems by Salvia Plath

View Publication Preview PDF