Preferred Language
Articles
/
lhdALpEBVTCNdQwCm5P3
The Efficacy of Bedside Chest Ultrasound in the Detection of Traumatic Pneumothorax
...Show More Authors
Background

Chest X-rays have long been used to diagnose pneumothorax. In trauma patients, chest ultrasonography combined with chest CT may be a safer, faster, and more accurate approach. This could lead to better and quicker management of traumatic pneumothorax, as well as enhanced patient safety and clinical results.

Aim

The purpose of this study was to assess the efficacy and utility of bedside US chest in identifying traumatic pneumothorax and also its capacity to estimate the extent of the lesion in comparison to the gold standard modality chest computed tomography.

Methods

This was an observational cross-sectional study of 160 patients with traumatic pneumothorax. This sample was collected from all chest trauma patients admitted to Al-Kindy Teaching Hospital in Baghdad-Iraq between November 2021 and September 2022. Such patients were to have a bedside chest US and chest CT scan performed by a skilled radiologist to detect lung point signs and lung sliding, which would be used to determine the patient's pneumothorax status.

Results

According to the study's findings, about 77.5% of the patients evaluated were men. Furthermore, 40.6% of patients experienced blunt trauma. Chest ultrasound revealed positive pneumothorax in 50 cases (31.2%), while positive pneumothorax was confirmed by computed tomography in 53 cases (33.1%) with no significance in the detection of pneumothorax between the two imaging modalities p-value(0.719). Comparably, there was no significant difference in estimating the size of a pneumothorax between the two modalities (p-value = 0.547). Chest ultrasound diagnostic accuracy showed a sensitivity of approximately 92.45%, specificity of 99.07%, and diagnostic accuracy of 96.88%.

Conclusion

Our findings indicated that chest ultrasound might be a valuable rapid diagnostic tool for traumatic pneumothorax in the emergency department in addition to diagnosis. It eliminates the need to transport patients for a CT chest scan.

Scopus Crossref
View Publication
Publication Date
Thu Oct 18 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
STUDY OF THE TEMPORAL EFFECT OF THE LEVEL OF THE CREATINE KINASE ENZYME CK-MB AND SOME BIOMARKERS IN PATIENTS WITH MYOCARDIAL INFARCTION AND HEART FAILURE IN RAMADI CITY: STUDY OF THE TEMPORAL EFFECT OF THE LEVEL OF THE CREATINE KINASE ENZYME CK-MB AND SOME BIOMARKERS IN PATIENTS WITH MYOCARDIAL INFARCTION AND HEART FAILURE IN RAMADI CITY
...Show More Authors

The current study is designed to achieve the goal of early detection of heart disease because it is the main risk of death. Some biomarkers were measured as well as the percentage of the effect of certain risk factors in people with myocardial infarction and heart failure. The study included 40 serum samples from people with heart disease. The effectiveness of the creatine kinase (CK-MB), as well as its temporal and albumin effects, as well as sodium ions in people with myocardial infarction and heart failure, were compared with the control group. as shown below:

-The first group consisted of 25 blood samples from people with myocardial infarction and 15 serum samples from people with heart failure. Blood

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Fairness in explaining the provisions of endowments A study to clarify the provisions of endowments according to the views of the Jaafari school of thought compared to the provisions of Iraqi laws.
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

It is no secret to everyone that the endowment is an important nucleus for the prosperity of Islamic civilization, especially in the fields of education, health, economy, and defensive military actions that fall within the door of jihad, and so on. Al-Ashraf, Qom Al-Quds, Cairo, and other parts of the Islamic world. What we will see in the research.

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref