Preferred Language
Articles
/
yhf-fI4BVTCNdQwCLkoQ
Excellent recovery after nonmissile penetrating traumatic brain injury in a child: A case report
...Show More Authors
Background:

Nonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.

Case Description:

We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull base zone.

Conclusion:

We demonstrated that following standard recommendations in the management of pTBI which include applying the advanced trauma life support protocol in ER, acquiring the needed preoperative neuroimaging studies, avoiding moving the penetrating object till patient shifted to OR, and finally performing a planned stepwise surgical intervention through craniotomy may yield an excellent functional recovery, especially in children despite an otherwise grave initial presentation and apparently profound brain injury.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Toward a theoretical model of the terrorist personality and differentiation from psychopathic personality
...Show More Authors

The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical  model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .

View Publication Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Direct Contact Membrane Distillation for Separation of Hcl From A Mixture of Acids
...Show More Authors

HCl is separated from HCl –H2SOsolution by membrane distillation process(MD). The flat –sheet membranes made from polyvinylidene fluoride (PVDF) and polypropylene (pp.). Plate and frame these types of membrane where used in the process. The feed is a mixture of HCl and H2SO4 acids compositions depended on metals treated object.HCl concentration increased in the permeate during the process but sulfuric acid increased gradually in the feed .During the concentration of solution acids concentrations in the feed at the beginning were 50 g/dm3 of sulfuric acid and 50 g/dm3 of hydrochloric acid at 333K feed temperature the permeate flux was 71 dm

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving of the Quadratic Fractional Programming Problems by a Modified Symmetric Fuzzy Approach
...Show More Authors

The aims of the paper are to present a modified symmetric fuzzy approach to find the best workable compromise solution for quadratic fractional programming problems (QFPP) with fuzzy crisp in both the objective functions and the constraints. We introduced a modified symmetric fuzzy by proposing a procedure, that starts first by converting the quadratic fractional programming problems that exist in the objective functions to crisp numbers and then converts the linear function that exists in the constraints to crisp numbers. After that, we applied the fuzzy approach to determine the optimal solution for our quadratic fractional programming problem which is supported theoretically and practically. The computer application for the algo

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 25 2025
Journal Name
Journal Of Physical Education
A Safe Environment Scale from Professional Basketball Players and Coaches’ Point Of View
...Show More Authors

The aim of the research was to prepare the fields and items for safe environment scale form professional basketball players and coaches’ point of view. The researchers used the descriptive method on professional athletes of players and coaches from (11) clubs; for the pilot study (21) athletes were selected and for the building sample (103) athletes, and standardization sample (101) athletes from the participants in the Iraqi league (2018-2019). The scale of the safe environment was concluded with (6) fields and (52) items. The researchers came up with the safe environment scale from the point of view of professional basketball players and coaches. Finally the researchers recommended paying attention to providing safe environment for athl

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparison between Rowatinex and Tamsulosin as a Medical Expulsion Therapy for Ureteral Stone
...Show More Authors

The objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.

Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.

Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 24 2024
Journal Name
Cogent Arts & Humanities
Women’s health on social media: a corpus stylistic study of Pink October campaigns
...Show More Authors

.

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Italian Journal Of Pure And Applied Mathematics
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Crawling and Mining the Dark Web: A Survey on Existing and New Approaches
...Show More Authors

    The last two decades have seen a marked increase in the illegal activities on the Dark Web. Prompt evolvement and use of sophisticated protocols make it difficult for security agencies to identify and investigate these activities by conventional methods. Moreover, tracing criminals and terrorists poses a great challenge keeping in mind that cybercrimes are no less serious than real life crimes. At the same time, computer security societies and law enforcement pay a great deal of attention on detecting and monitoring illegal sites on the Dark Web. Retrieval of relevant information is not an easy task because of vastness and ever-changing nature of the Dark Web; as a result, web crawlers play a vital role in achieving this task. The

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sat Apr 15 2023
Journal Name
Journal Of Robotics
A New Proposed Hybrid Learning Approach with Features for Extraction of Image Classification
...Show More Authors

Image classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref