Preferred Language
Articles
/
jkmc-13
Recurrent Laryngeal Nerve Injury With Versus Without Nerve Identification In Different Thyroidectomy Procedures
...Show More Authors

Background: The world health organization estimates that worldwide 2 billion people still have iodine deficiency Objectives: Is to make comparison between the effect of identification of recurrent laryngeal nerve (RLN) and non-identification of the nerve on incidence of recurrent laryngeal nerve injury (RLNI) in different thyroidectomy procedures.

Type of the study: cross –sectional study.

Methods: 132 patients with goiters underwent thyroidectomy .Identification of RLN visually by exposure were done for agroup of them and non-identification of the nerves for the other group. The outcomes of RLNI in the two groupsanalyzed statistically for the effect of Identification of RLN on decreasing the incidence of the nerveinjury .The benefits of identification of RLN evaluated in each procedure ofthyroidectomy which were total thyroidectomy (TT), near totalthyroidectomy (NTT), and subtotal thyroidectomy (STT).Patients were followed up monthly for 6 months by indirect laryngoscopy for mobility of the vocal cords.

Results: 132 patients underwent thyroidectomy,258 RLNswere at risk, 124 nerves were  identified and134 nerves were  not identified,1 RLN was injured in identified group, and  8 RLN were injured in non-identified group. The pvalue was (0.0393) which was significant. TT were performed for 56 patients (42.4%) and total hemi thyroidectomy(THT)  for 6patients(4.5%), there were 118 RLNs at risk, 64RLNs were identified and 54 RLNs were not identified.1RLN was injured in identified group, and 7RLNs were injured in non-identifiedgroup, the pvalue was(0.023)which was significant.NTT procedure were performed for 38 patients(28.8%) , 76 RLNs were at risk. 30 RLNswere identified and none of themwas injured, 46 RLNswere not identified, 1 RLN was injured the p value was(1)which was not significant.STT were performed for 32patients(24.4%),64 RLNs were at risk. 30 RLNs were  identified  and 34 RLNs not identified,there was no nerve injury in both groups .

Conclusions: identification of RLN decrease incidence of RLNI in TT, while there was no significant increase of RLNI in NTT and STT when the nerve was not identified

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 24 2026
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of the Solubility of Four Endodontic Sealers in Different Solvents (An In Vitro Study)
...Show More Authors

Background: Complete removal of filling material from the root canal is an essential requirement for endodontic retreatment. The purpose of the present study is to evaluate and compare the dissolving capabilities of various solvents (Xylene, Eugenate Desobturator, Eucalyptol, EDTA and Distilled water (as a control)) on four different types of sealer (Endofill, Apexit Plus, AH Plus and EndoSequence bioceramic sealer). Materials and method: Eighty samples of each sealer were prepared according to the manufacturers' instructions and then divided into ten groups (of 8 samples) for immersion in the respective solvents for 2 and 5 min immersion periods. Each sealer specimen was weighed to obtain its initial mass. The specimens were immersed in

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 13 2014
Journal Name
Asian Academic Research Associates
Thermodynamic Study of Poly (Vinyl Alcohol) in Aqueous Solution and in Tetrahydrofurfuryl alcohol at Different Temperatures
...Show More Authors

Publication Date
Thu Sep 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Different Methods of Canine Retraction- Part 1
...Show More Authors

Background: This review aimed at explaining different methods of canine retraction along the archwire. Methods: Searching for different methods of canine retraction using fixed orthodontic appliances was carried out using different databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and hand searching from 1930 till February 2022. Results: After excluding the duplicate articles, papers describing the methods of canine retraction along the archwires were included. The most commonly used methods are NiTi closed coil spring and elastic chain. Conclusions: Various methods of canine retraction along the archwires were explained in detail regarding their adv

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Synthesis of some polyimides by different methods
...Show More Authors

in this work the polymides were prepared as rthemally stable polymers by diffrent ways

View Publication Preview PDF
Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Heat Transfer Efficiency of Different Composite Insulators
...Show More Authors

This research aims to investigate the thermal performance of different thermal composite insulators, wrapped around a closed-loop copper pipe (CLP). To achieve this aim a system was designed and manufactured. It is consisted of closed water tank insulated by Rock Wool, and supplied with two electric heaters, two thermostat, a flow meter, a water pump, digital temperature scales, and four series of (CLP).
Six insulators were prepared namely; composites of Impregnated Fiberglass with Elastoclad and foaming Rubber (FER), Impregnated Fiberglass with Elastoclad resin and Polymeric Membrane (FEM), Impregnated Fiberglass with Polyurethane thermoset resin and Foaming Rubber (FUR), Impregnated Fiberglass with Polyurethane thermoset resin and P

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Boron Removal by Adsorption onto Different Oxides
...Show More Authors

A research was conducted to determine the feasibility of using adsorption process to remove boron from aqueous solutions using batch technique. Three adsorbent materials; magnesium, aluminum and iron oxide were investigated to find their abilities for boron removal. The effects of operational parameters on boron removal efficiency for each material were determined.
The experimental results revealed that maximum boron removal was achieved at pH 9.5 for magnesium oxide and 8 for aluminum and iron oxide. The percentage of boron adsorbed onto magnesium,aluminum and iron oxide reaches up to 90, 42.5 and 41.5% respectively under appropriate conditions. Boron concentration in effluent water after adsorption via magnesium oxide comply with th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Different methods of canine retraction- Part 2
...Show More Authors

Background: This review aims to discuss various canine retraction techniques using frictionless mechanics. Methods: Between 1930 and February 2022, searches were conducted about various canine retraction techniques using fixed orthodontic appliances in various databases, including PubMed Central, Science Direct, Wiley Online Library, the Cochrane Library, Textbooks, Google Scholar, Research Gate, and manual searching. Results: After removing the duplicate articles, publications that described how to use archwires to perform canine retraction with the archwires were included. Conclusions: The pros and cons of various canine retraction techniques using archwires were thoroughly discussed. T-loop is the preferred spring of all because of it

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Information Using different lighting Color images
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref