Preferred Language
Articles
/
jkmc-82
Outcome of surgical untethering of tethered cord syndrome in adults due to spina bifida occulta
...Show More Authors

Background:. Children with spina bifida occulta require early surgery to prevent neurological deficits. The treatment of patients with a congenitally tethered cord who present in adulthood remains controversial.

Objective: The aim of this study is to describe the outcome obtained in 61 adult patients with congenital TCS and no prior surgical treatment who underwent surgical untethering.

Methods: This prospective study was conducted on 61 adult patients who underwent surgical untethering for spina bifida occulta at four neurosurgical centers in Baghdad / Iraq  between March 2000 and January 2018. Patients who had undergone prior myelomeningocele repair or tethered cord release surgery were excluded.

The most common intraoperative findings were lipomyelomeningocele (41%) and a tight terminal filum (36%). The follow-up duration ranged from 10.8 to 149.5 months (mean 20.9 months). Of the 34 patients with back pain, status improved in 65%, worsened in 3%, remained unchanged in 18%, and improved and later recurred in 15%. Lower-extremity pain improved in 16 patients (53%), remained unchanged in 23%, improved and then recurred in 17%, and worsened in 7%. Lower-extremity weakness improved in 47%, remained unchanged in 47%, and improved and then recurred in 5%. Finally, of the 17 patients with lower-extremity sensory changes,

status improved in 35%, remained unchanged in 35%, and the information on five patients was unavailable. Surgical complications included three wound infections, one cerebrospinal fluid leak, and two pseudomeningoceles requiring surgical revision. One patient developed acute respiratory distress syndrome and sepsis postoperatively and died several days later.

Conclusions: Adult-age presentation of a congenital tethered cord is unusual. Despite a slight increase in postoperative neurological injury in adults, surgery has relatively low risk and offers good potential for neurological improvement or stabilization. As in children, we recommend early surgery in adults with this disorder. The decision to undertake surgery, however, should be modulated by other factors such as a patient’s general medical condition and risk posed by anesthesia.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
The Dens of Extremism and Terrorism in Syrian Camps (Al-Hol as a model)
...Show More Authors

 

After the defeat of the military terrorist organization "ISIS" and the fall of the throne of its alleged state in the Iraqi city of Nineveh, in Syrian Baghouz, and the end of its control over the land, the Syrian camps, especially "Al-Hol" camp, emerge as an incubator for the ideology of the terrorist organization "ISIS" and a vital base for its consolidation and dissemination, which includes (68,000- 73,000) people. During the years following the military defeat of (ISIS), the camp witnesses the spread of extremist ideas widely at the hands of its residents, including the families of the organizations dead's, extremist detainees, and those who deal with it, taking advantage of the deterioration of the environmental, se

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Astronomy & Astrophysics
The spatial extent of polycyclic aromatic hydrocarbons emission in the Herbig star HD 179218
...Show More Authors

Aim. We investigate, in the mid-infrared, the spatial properties of the polycyclic aromatic hydrocarbons (PAHs) emission in the disk of HD 179218, an intermediate-mass Herbig star at ~300 pc.

Methods. We obtained mid-infrared images in the PAH-1, PAH-2 and Si-6 filters centered at 8.6, 11.3, and 12.5 μm, and N-band low-resolution spectra using CanariCam on the 10-m Gran Telescopio Canarias (GTC). We compared the point spread function (PSF) profiles measured in the PAH filters to the profile derived in the Si-6 filter, where the thermal continuum emission dominates. We performed radiative transfer modeling of

... Show More
View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
The Geographical Distribution of Wheat Crop in Wasit Province for the period ( 2003 – 2010 )
...Show More Authors

This study focuses on the basics of cultivation and production of the Wheat Crop in
Wasit Province ; in order to reveal the reality of the geographical distribution of its cultivation
and production.
Wheat is the most important field crops cultivated in Wasit province, as it has vast
possibilities for expansion in growing and production, in which agriculture conducted in a
year and left in other , then changing this method would increase cultivated area of it to nearly
doubled, as well as the possibility of increasing average yields in Donam by using improved
seeds, fertilizer, with the availability of water lever machines, especially wheat is grown in
areas of rivers abutment.
The study showed the spread of th

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Humidity effect on diffusion and length coefficient of radon in soil and building materials
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Measuring of C-reactive protein titer in patients with acute hepatitis-C Virus infection
...Show More Authors

Objective(s): To measure serum C-reactive protein (CRP) titer as a predictive diagnosis of acute hepatitis C virus (HCV)
infection.
Methodology: Two hundred and ten patients with acute HCV infection and 234 apparently healthy individuals as
control group were enrolled in this study in Baghdad medical city (Teaching Laboratories). The patents include
74(35.2%) females and 136 (64.8%) males with mean age (27±16.5) years. The control group includes 114 (48.7%)
females and 120 (51.3%) males with mean age (26±5.8) years. Blood samples were collected from out patients from
Alfadul in Baghdad city. Sera were separated and stored at 20 0
C. The diagnosis of acute HCV infection was based on
detection of HC Ag and anti- H

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Telematics And Informatics
Modelling the utilization of cloud health information systems in the Iraqi public healthcare sector
...Show More Authors

View Publication
Scopus (69)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of Illocutionary Act in a Selected Presidential Speech on COVID-19
...Show More Authors

     This paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak.  A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.

     What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Evaluation of Convective Heat Transfer and Natural Circulation in an Evacuated Tube Solar Collector
...Show More Authors

The evacuated tube solar collector ETC is studied intensively and extensively by experimental and
theoretical works, in order to investigate its performance and enhancement of heat transfer, for Baghdad climate
from April 2011 till the end of March 2012. Experimental work is carried out on a well instrumented collector
consists of 16 evacuated tubes of aspect ratio 38.6 and thermally insulated tank of volume 112L. The relation
between convective heat transfer and natural circulation inside the tube is estimated, collector efficiency, effect of
tube tilt angles, incidence angle modifier, The solar heating system is investigated under different loads pattern (i.e
closed and open flow) to evaluate the heat loss coefficient

... Show More
View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref