Preferred Language
Articles
/
jkmc-82
Outcome of surgical untethering of tethered cord syndrome in adults due to spina bifida occulta
...Show More Authors

Background:. Children with spina bifida occulta require early surgery to prevent neurological deficits. The treatment of patients with a congenitally tethered cord who present in adulthood remains controversial.

Objective: The aim of this study is to describe the outcome obtained in 61 adult patients with congenital TCS and no prior surgical treatment who underwent surgical untethering.

Methods: This prospective study was conducted on 61 adult patients who underwent surgical untethering for spina bifida occulta at four neurosurgical centers in Baghdad / Iraq  between March 2000 and January 2018. Patients who had undergone prior myelomeningocele repair or tethered cord release surgery were excluded.

The most common intraoperative findings were lipomyelomeningocele (41%) and a tight terminal filum (36%). The follow-up duration ranged from 10.8 to 149.5 months (mean 20.9 months). Of the 34 patients with back pain, status improved in 65%, worsened in 3%, remained unchanged in 18%, and improved and later recurred in 15%. Lower-extremity pain improved in 16 patients (53%), remained unchanged in 23%, improved and then recurred in 17%, and worsened in 7%. Lower-extremity weakness improved in 47%, remained unchanged in 47%, and improved and then recurred in 5%. Finally, of the 17 patients with lower-extremity sensory changes,

status improved in 35%, remained unchanged in 35%, and the information on five patients was unavailable. Surgical complications included three wound infections, one cerebrospinal fluid leak, and two pseudomeningoceles requiring surgical revision. One patient developed acute respiratory distress syndrome and sepsis postoperatively and died several days later.

Conclusions: Adult-age presentation of a congenital tethered cord is unusual. Despite a slight increase in postoperative neurological injury in adults, surgery has relatively low risk and offers good potential for neurological improvement or stabilization. As in children, we recommend early surgery in adults with this disorder. The decision to undertake surgery, however, should be modulated by other factors such as a patient’s general medical condition and risk posed by anesthesia.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Structural Design According to Constructal Theory in Architecture
...Show More Authors
Abstract<p>Constructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves </p> ... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Electron Contribution to Stopping Power in Burning Plasma
...Show More Authors

The dependence of the energy losses or the stopping power for the energies and the related penetrating factor are arrive by using a theoretical approximation models. in this work we reach a compatible agreement between our results and the corresponding experimental results.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
IL-17 in Protective Immunity to Vaginal Candidiasis
...Show More Authors

Vulvovaginal candidiasis (VVC) is caused by Candida albicans affects a significant number of women during their reproductive ages. Th17 cells play a major role in coordinating the host defense in oropharyngeal candidiasis. In this study we investigated the involvement of the Th17 response in an animal model of vulvovaginal candidiasis (VVC). The present study aimed to shed light on detect concentration of the IL-17 of infected animal and control . A direct Enzyme Linked Immunosorbent Assay (ELISA) was used to quantify IL-17 concentrations in 30 infected animal with VVC and 10 control group. Rats were intravaginally inoculated with C.albicans, and vaginal lavage fluids, serum were evaluated for proinflammatory cytokine IL-17 The data

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Politeness Theories in Synge's Riders to the Sea
...Show More Authors

This research tackles the play of Synge "Rider to the Sea" to find out whether the
theories of Leech (1983) and Brown and Levinson (1987) can be applied or not to this study.
The model of Leech (1983) consists of seven principles and for Brown and Levinson
(1987),it consists of two principles of politeness where one of them is positive and the other is
negative politeness.
It is hypothesed that:
1. There is a relation between the two theories.
2. Synge deals with these theories in such a way to depict his characters.
3. It is also hypothesed that every character deals with these principles in such a way to show
the events of the play.
The study concludes that there is a relation between the two theories in d

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Measuring response human capital to investment in elements
...Show More Authors

        This aim research of this  discussion impact of investment in human capital dimensions (training, education, knowledge management, skills development) and its components (knowledge, skills, abilities, value) with the Office of the Inspector General's staff - Ministry of Culture in Iraq, has depended questionnaire as a tool in the collection data and information ,subjected to a measure of validity and reliability, and distributed to a sample of (63) individuals were distributed in positions (director, director of the Division of employees) have been analyzed data search using ready-statistical software (SPSS) the used hypothesis testing and correlati

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Discriminant Analysis to Assess Deprivation Index in Iraq
...Show More Authors

The aim of this study is to achieve the best distinguishing function of the variables which have common characteristics to distinguish between the groups in order to identify the situation of the governorates that suffer from the problem of deprivation. This allows the parties concerned and the regulatory authorities to intervene to take corrective measures. The main indicators of the deprivation index included (education, health, infrastructure, housing, protection) were based on 2010 data available in the Central Bureau of Statistics

View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Iet Conference Proceedings
Spatial quantile autoregressive model with application to poverty rates in the districts of Iraq
...Show More Authors

This research aims to provide insight into the Spatial Autoregressive Quantile Regression model (SARQR), which is more general than the Spatial Autoregressive model (SAR) and Quantile Regression model (QR) by integrating aspects of both. Since Bayesian approaches may produce reliable estimates of parameter and overcome the problems that standard estimating techniques, hence, in this model (SARQR), they were used to estimate the parameters. Bayesian inference was carried out using Markov Chain Monte Carlo (MCMC) techniques. Several criteria were used in comparison, such as root mean squared error (RMSE), mean absolute percentage error (MAPE), and coefficient of determination (R^2). The application was devoted on dataset of poverty rates acro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Scientific Development For Studies And Research
The Role of E-Learning in teaching the Arabic language to non- native speakers
...Show More Authors

After the information revolution that occurred in the Western world, and the developments in all fields, especially in the field of education and e-learning, from an integrated system based on the effective employment of information and communication technology in the teaching and learning processes through an environment rich in computer and Internet applications, the community and the learner were able to access information sources and learning at any time and place, in a way that achieves mutual interaction between the elements of the system and the surrounding environment. After the occurrence of the phenomenon of Covid 19, it led to a major interruption in all educational systems that had never happened before, and the disrupt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Caspian Journal Of Environmental Sciences
DNA-damage in blood of welders occupationally exposed to welding fume using comet assay
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.