Preferred Language
Articles
/
BUJs15kBMeyNPGM3lLko
Incidence of Stenosis in Graft Renal Arteries Anastomosis in Kidney Transplantation Using Two Different Techniques
...Show More Authors

Summary Kidney transplantation is widely performed nowadays as an optimal treatment of end stage kidney diseases. Complications such as stenosis in graft renal arteries anastomosis may occur. Different suturing techniques are available for renal artery anastomosis. We aimed to compare the incidence of renal artery stenosis of the transplanted kidney when two suture techniques (continuous or interrupted) used for renal artery anastomosis. Therefore, a retrospectively comparative study was conducted on 44 patients managed with kidney transplantation during the years 2009-2011. Patients assigned into two groups; first group included 20 patients namely, continuous suture group, and the second group included 24 patients in whom the allograft arteries were anastomosed with an interrupted suture technique. Post transplantation, the velocity of blood flow in the renal and iliac arteries at the site of anastomosis was assessed using color duplex ultrasonography for the presence of graft renal artery stenosis. In each group only one case developed We graft renal artery stenosis with no statistically significant difference in the incidence rate. In conclusion, No difference in the incidence of graft renal artery stenosis in different anastomosis techniques. Other factors such as gentle handling of tissue, enough spatulation, margin eversion, and comparable diameter of the anastomosed vessels may be more important in the prevention of renal allograft stenosis than the type of suture technique used.

Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Boron Removal by Adsorption onto Different Oxides
...Show More Authors

A research was conducted to determine the feasibility of using adsorption process to remove boron from aqueous solutions using batch technique. Three adsorbent materials; magnesium, aluminum and iron oxide were investigated to find their abilities for boron removal. The effects of operational parameters on boron removal efficiency for each material were determined.
The experimental results revealed that maximum boron removal was achieved at pH 9.5 for magnesium oxide and 8 for aluminum and iron oxide. The percentage of boron adsorbed onto magnesium,aluminum and iron oxide reaches up to 90, 42.5 and 41.5% respectively under appropriate conditions. Boron concentration in effluent water after adsorption via magnesium oxide comply with th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 02 2008
Journal Name
Baghdad Science Journal
Spectrophotometric determination of Procaine penicillin in pure and pharmaceutical formulations using metol
...Show More Authors

A simple, accurate and sensitive spectrophotometric method for the determination of Procaine penicillin (PP) is described. The method is based on charge-transfer reaction of PP with metol (N-methyl-p-hydroxy aniline) in the presence of ferric sulphate to form a purple-water soluble complex ,which is stable and has a maximum absorption at 510 nm .A graph of absorbance versus concentration shows that Beer’s low is obeyed over the concentration range of 3-80 µg /ml of PP (i.e.,3-80 ppm) with a molar absorbativity of 4.945 ×103 L.mol-1.cm-1 ,Sandell sensitivity of 0.1190 µg cm-2 ,a relative error of (-1.57)-2.79 % and a standard deviation of less than 0.59 depending on the concentration of PP.The optimum conditions for full co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 29 2022
Journal Name
Current Trends In Geotechnical Engineering And Construction (pp.52-61)
Simulation of Residual Chlorine in Al-Yarmouk Drinking Water System Using WaterGEMS
...Show More Authors

Abstract To ensure that the distribution system has safe drinking water. It is necessary to know the residual chlorine concentrations at various points in the network. A chlorine photometer device was used to measure twenty points taken every day for a week at a selected time in the distribution system. Both pressures and flows in the network were measured using bourdon gauge and Tuf-2000H Handheld Digital ultrasonic flow meters. WaterGEMS CONNECT Edition update one software was used to simulate the flow in the network. The Baghdad water department provided the data about the network, such as the lengths of pipes, the layout of the network, and pipes diameters. The network calibrated consists of 781 pipes of different lengths and 542 juncti

... Show More
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Corrosion behavior of mild-steel in cooling towers using high salinity solution
...Show More Authors

Cooling towers is one of the most important unit in industry, they are used to dispose heat from cooling media used in the integrated units. The choice of the cooling media plays recently an important rule due to fresh-water scarcity. The use of saline as a cooling media become of growing interest, but the corrosion problem has to be taken in consideration. In this study the simultaneous effect of cooling tower operation parameters on the corrosion rate of mild-steel is considered. The role of NaCl content is found to be pronounced more than the working solution temperature and flowrate. The corrosion of mild-steel in these studied factors had shown an interesting result especially with the NaCl% content. Firstly, there was an increase in t

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 30 2018
Journal Name
Civil Engineering Journal
Determining the Causes of Punching Shear in Reinforced Slabs Using Fishbone Diagram
...Show More Authors

Risk identification and assessment can be analysed using many risk management tools. Fishbone diagram is one of these techniques which can be employed, for the identification of the causes behind the construction failure, which   has become a phenomenon that often gets repeated in several projects. If these failures are not understood and handled scientifically, it may lead to disputes between the project parties. Additionally, the construction failure also leads to an increase in the project budget, which in turn causes a delay in the completion of the projects. Punching shear in reinforcement slab may be one of the reasons for construction failures. However, there are many doubts about other causes that lead to this failure as w

... Show More
Crossref (3)
Clarivate Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Diagnostic Approach of Atypical Cells in Effusion Cytology Using Computerized Image Analysis
...Show More Authors

Background: Cytology is one of the important diagnostic tests done on effusion fluid. It can detect malignant cells in up to 60% of malignant cases. The most important benign cell present in these effusions is the mesothelial cell. Mesothelial atypia can be striking andmay simulate metastatic carcinoma. Many clinical conditions may produce such a reactive atypical cells as in anemia,SLE, liver cirrhosis and many other conditions. Recently many studies showed the value of computerized image analysis in differentiating atypical cells from malignant adenocarcinoma cells in effusion smears. Other studies support the reliability of the quantitative analysisand morphometric features and proved that they are objective prognostic indices. Method

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Corrosion Inhibition of Low Carbon Steel in Sulfuric Acid Using Polyvinyl Alcohol
...Show More Authors

The inhibitive power of Polyvinyl Alcohol (PVA) was investigated toward the corrosion of carbon steel in 0.2N H2SO4 solution in the temperature range of 30-60˚C and PVA concentration range of 150-2000 ppm.

   The corrosion rate was measured using both the weight loss and the electrochemical techniques. The weight loss results showed that PVA could serve as a corrosion inhibitor but its inhibition power was found to be low for the corrosion of carbon steel in the acidic media. Electrochemical analysis of the corrosion process of carbon steel in an electrochemical corrosion cell was investigated using 3-Electrode corrosion cell. Polarization technique was used for carbon steel corrosion in 0.2N H

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
In Vitro Comparative Assessment of Composite Nanoleakage Using Various Dentine Surface Treatments
...Show More Authors

Background: The treatment of dental tissues proceeding to adhesive procedures is a crucial step in the bonding protocol and decides the clinical success ofrestorations. This study was conducted in vitro, with the aim of evaluating thenanoleakage on the interface between the adhesive system and the dentine treated by five surface modalities using scanning electron microscopy and energydispersiveX-ray spectrometry. Materials and methods: Twenty five extracted premolars teeth were selected in the study. Standardized class V cavities were prepared on the buccal and lingual surfaces then the teeth divided into five main groups of (5 teeth in each group n=10) according to the type of dentine surface treatment that was used: Group (A): dentine was

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref