Search results for: Haitham Baghlaf
29 Maternal, Delivery and Neonatal Outcomes in Women with Cervical Cancer. A Study of a Population Database
Authors: Aaron Samuels, Ahmad Badeghiesh, Haitham Baghlaf, Michael H. Dahan
Abstract:
Importance: Cervical cancer is the fourth most common cancer among women globally and a significant cause of cancer-related deaths. Understanding the impact of cervical cancer diagnosed during pregnancy on maternal, delivery, and neonatal outcomes is crucial for improving clinical management and outcomes for affected women and their children. Objective: The goal is to determine the effects of cervical cancer diagnosed during pregnancy on maternal, delivery, and neonatal outcomes using a population-based American database. Design: This study is a retrospective analysis of the Healthcare Cost and Utilization Project Nationwide Inpatient Sample (HCUP-NIS) database. The study period spans between 2004-2014, and the analysis was conducted in 2023. Setting: The study used the HCUP-NIS database, which includes data from hospital stays across the United States, covering 48 states and the District of Columbia. Participants: The study included all women who delivered a child or had a maternal death from 2004-2014, with pregnancies at 24 weeks or above. The population was comprised of 9,096,788 pregnant women, including 222 diagnosed with cervical cancer prior to delivery. Exposures: The exposure was a diagnosis of cervical cancer during pregnancy, identified using International Classification of Diseases 9th Revision codes 180.0, 180.1, 180.8, and 180.9. Main Outcomes and Measures: Primary outcomes included maternal, delivery, and neonatal complications including preterm delivery, cesarean section, hysterectomy, blood transfusion, deep venous thrombosis, pulmonary embolism, congenital anomalies, intrauterine fetal demise, and small-for-gestational-age neonates. Logistic regression analyses were conducted to evaluate the association between cervical cancer diagnosis and these outcomes, adjusting for potential confounding factors. Results: Women with cervical cancer were older (25.2% ≥35 years vs. 14.7%, p=0.001, respectively); more likely to have Medicare insurance (1.4% vs. 0.6%, p=0.005, respectively); use illicit drugs (4.1% vs. 1.4%, p=0.001, respectively); smoke tobacco during pregnancy (14.9% vs. 4.9%, p=0.001, respectively); and have chronic hypertension (3.6% vs. 1.8%, p=0.046, respectively). These women also had higher rates of preterm delivery (OR = 4.73, 95% CI (3.53-6.36), p=0.001); cesarean section (OR = 5.40, 95% CI (4.00-7.30), p=0.001); hysterectomy (OR = 390.23, 95% CI (286.43-531.65), p=0.001); blood transfusions (OR = 19.23, 95% CI (13.57-27.25), p=0.001); deep venous thrombosis (OR = 9.42, 95% CI (1.32-67.20), p=0.025); and pulmonary embolism (OR = 20.22, 95% CI (2.83-144.48), p=0.003). Neonatal outcomes, including congenital anomalies, intrauterine fetal demise, and small-for-gestational-age neonates, were comparable between groups. Conclusions and Relevance: Cervical cancer during pregnancy is associated with significant maternal and delivery risks; however, neonatal outcomes are largely unaffected. These findings highlight the need for a multidisciplinary approach to managing pregnant cervical cancer patients involving oncological, obstetrical, and neonatal care specialists.Keywords: cervical cancer, maternal outcomes, neonatal outcomes, delivery outcomes
Procedia PDF Downloads 028 Gas Flotation Unit in Kuwait Oil Company Operations
Authors: Homoud Bourisli, Haitham Safar
Abstract:
Oil is one of main resources of energy in the world. As conventional oil is drying out, oil recovery is crucial to maintain the same level of oil production. Since water injection is one of the commonly used methods to increase and maintain pressure in oil wells, oil-water separation processes of the water associated with oil production for water injection oil recovery is very essential. Therefore, Gas Flotation Units are used for oil-water separation to be able to re-inject the treated water back into the wells to increase pressure.Keywords: Kuwait oil company, dissolved gas flotation unit, induced gas flotation unit, oil-water separation
Procedia PDF Downloads 57427 Harmony Search-Based K-Coverage Enhancement in Wireless Sensor Networks
Authors: Shaimaa M. Mohamed, Haitham S. Hamza, Imane A. Saroit
Abstract:
Many wireless sensor network applications require K-coverage of the monitored area. In this paper, we propose a scalable harmony search based algorithm in terms of execution time, K-Coverage Enhancement Algorithm (KCEA), it attempts to enhance initial coverage, and achieve the required K-coverage degree for a specific application efficiently. Simulation results show that the proposed algorithm achieves coverage improvement of 5.34% compared to K-Coverage Rate Deployment (K-CRD), which achieves 1.31% when deploying one additional sensor. Moreover, the proposed algorithm is more time efficient.Keywords: Wireless Sensor Networks (WSN), harmony search algorithms, K-Coverage, Mobile WSN
Procedia PDF Downloads 52626 Private Law, Public Justice: Another Look at Imprisonment for Debt under the Jordanian Law
Authors: Haitham A. Haloush
Abstract:
Debtors' imprisonment in Jordan is a problematic issue since it impinges upon required financial guarantees that are presumably offered by debtors on the one hand, and infringes flagrantly the International Covenant on Civil and Political Rights on the other hand. Jordan lacks regulatory provisions in this respect and debtors' imprisonment is indirectly exercised in Jordan without giving a special legal attention to this concern. From this perspective, this research reviews the available regulations, standard laws and codes of conduct that might guide the implementation of the International Covenant on Civil and Political Rights in the Jordanian context. Furthermore, this article will examine the suitability of the Jordanian legal system in providing sufficient protection for debtors. The author argues that there are serious obstacles in this aspect.Keywords: the Jordanian civil code, the Jordanian execution law, imprisonment for debt, good faith, the Jordanian constitution, the international covenant on civil and political rights
Procedia PDF Downloads 12225 An Ontology for Semantic Enrichment of RFID Systems
Authors: Haitham S. Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, Kamilia Hosny
Abstract:
Radio Frequency Identification (RFID) has become a key technology in the margining concept of Internet of Things (IoT). Naturally, business applications would require the deployment of various RFID systems that are developed by different vendors and use various data formats. This heterogeneity poses a real challenge in developing large-scale IoT systems with RFID as integration is becoming very complex and challenging. Semantic integration is a key approach to deal with this challenge. To do so, ontology for RFID systems need to be developed in order to annotated semantically RFID systems, and hence, facilitate their integration. Accordingly, in this paper, we propose ontology for RFID systems. The proposed ontology can be used to semantically enrich RFID systems, and hence, improve their usage and reasoning. The usage of the proposed ontology is explained through a simple scenario in the health care domain.Keywords: RFID, semantic technology, ontology, sparql query language, heterogeneity
Procedia PDF Downloads 47124 The Effect of Inlet Baffle Position in Improving the Efficiency of Oil and Water Gravity Separator Tanks
Authors: Haitham A. Hussein, Rozi Abdullah, Issa Saket, Md. Azlin
Abstract:
The gravitational effect has been extensively applied to separate oil from water in water and wastewater treatment systems. The maximum oil globules removal efficiency is improved by obtaining the best flow uniformity in separator tanks. This study used 2D computational fluid dynamics (CFD) to investigate the effect of different inlet baffle positions inside the separator tank. Laboratory experiment has been conducted, and the measured velocity fields which were by Nortek Acoustic Doppler Velocimeter (ADV) are used to verify the CFD model. Computational investigation results indicated that the construction of an inlet baffle in a suitable location provides the minimum recirculation zone volume, creates the best flow uniformity, and dissipates kinetic energy in the oil and water separator tank. Useful formulas were predicted to design the oil and water separator tanks geometry based on an experimental model.Keywords: oil/water separator tanks, inlet baffles, CFD, VOF
Procedia PDF Downloads 36823 Poor Cognitive Flexibility as Suggested Basis for Learning Difficulties among Children with Moderate-INTO-Severe Asthma: Evidence from WCSTPerformance
Authors: Haitham Taha
Abstract:
The cognitive flexibility of 27 asthmatic children with learning difficulties was tested by using the Wisconsin card sorting test (WCST) and compared to the performances of 30 non-asthmatic children who have persistence learning difficulties also. The results revealed that the asthmatic group had poor performance through all the WCST psychometric parameters and especially the preservative errors one. The results were discussed in light of the postulation that poor executive functions and specifically poor cognitive flexibility are in the basis of the learning difficulties of asthmatic children with learning difficulties. Neurophysiologic framework was suggested for explaining the etiology of poor executive functions and cognitive flexibility among children with moderate into severe asthma.Keywords: asthma, learning disabilities, executive functions, cognitive flexibility, WCST
Procedia PDF Downloads 50222 Dynamic Bandwidth Allocation in Fiber-Wireless (FiWi) Networks
Authors: Eman I. Raslan, Haitham S. Hamza, Reda A. El-Khoribi
Abstract:
Fiber-Wireless (FiWi) networks are a promising candidate for future broadband access networks. These networks combine the optical network as the back end where different passive optical network (PON) technologies are realized and the wireless network as the front end where different wireless technologies are adopted, e.g. LTE, WiMAX, Wi-Fi, and Wireless Mesh Networks (WMNs). The convergence of both optical and wireless technologies requires designing architectures with robust efficient and effective bandwidth allocation schemes. Different bandwidth allocation algorithms have been proposed in FiWi networks aiming to enhance the different segments of FiWi networks including wireless and optical subnetworks. In this survey, we focus on the differentiating between the different bandwidth allocation algorithms according to their enhancement segment of FiWi networks. We classify these techniques into wireless, optical and Hybrid bandwidth allocation techniques.Keywords: fiber-wireless (FiWi), dynamic bandwidth allocation (DBA), passive optical networks (PON), media access control (MAC)
Procedia PDF Downloads 53121 Planning a Supply Chain with Risk and Environmental Objectives
Authors: Ghanima Al-Sharrah, Haitham M. Lababidi, Yusuf I. Ali
Abstract:
The main objective of the current work is to introduce sustainability factors in optimizing the supply chain model for process industries. The supply chain models are normally based on purely economic considerations related to costs and profits. To account for sustainability, two additional factors have been introduced; environment and risk. A supply chain for an entire petroleum organization has been considered for implementing and testing the proposed optimization models. The environmental and risk factors were introduced as indicators reflecting the anticipated impact of the optimal production scenarios on sustainability. The aggregation method used in extending the single objective function to multi-objective function is proven to be quite effective in balancing the contribution of each objective term. The results indicate that introducing sustainability factor would slightly reduce the economic benefit while improving the environmental and risk reduction performances of the process industries.Keywords: environmental indicators, optimization, risk, supply chain
Procedia PDF Downloads 35120 Experimental and Computational Investigations of Baffle Position Effects on the Performance of Oil and Water Separator Tanks
Authors: Haitham A. Hussein, Rozi Abdullah, Md Azlin Md Said
Abstract:
Gravity separator tanks are used to separate oil from water in treatment units. Achieving the best flow uniformity in a separator tank will improve the maximum removal efficiency of oil globules from water. In this study, the effect on hydraulic performance of different baffle structure positions inside a tank was investigated. Experimental data and 2D computation fluid dynamics were used for analysis. In the numerical model, two-phase flow (drift flux model) was used to validate one-phase flow. For laboratory measurements, the velocity fields were measured using an acoustic Doppler velocimeter. The measurements were compared with the result of the computational model. The results of the experimental and computational simulations indicate that the best location of a baffle structure is achieved when the standard deviation of the velocity profile and the volume of the circulation zone inside the tank are minimized.Keywords: gravity separator tanks, CFD, baffle position, two phase flow, ADV, oil droplet
Procedia PDF Downloads 32919 Blockchain in Saudi E-Government: A Systematic Literature Review
Authors: Haitham Assiri, Priyadarsi Nanda
Abstract:
The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.Keywords: blockchain, data integrity, e-government, security threats
Procedia PDF Downloads 25018 3 Dimensions Finite Element Analysis of Tunnel-Pile Interaction Scenarios Using Abaqus Software
Authors: Haitham J. M. Odeh
Abstract:
This paper introduced an analysis of the effect of tunneling near pile foundations. Accomplished by three-dimensional finite element modeling. The numerical simulation is conducted using Abaqus finite element software. By examining different Tunnel-pile scenarios. The paper presents the tunnel induced pile responses, Such as pile settlement, pile internal forces, and the comments made on changing the vertical and transversal location of the tunnel related to the piles, the study contains two pile-supported structure cases, single and a group of piles. A comprehensive comparison between real case study results and numerical simulation is presented. The results of the analysis reveal the critical and safe location of tunnel construction and the positive effect of a group of piles existing instead of single piles. Also, demonstrates the changes in pile responses by changing the tunnel location.Keywords: pile responses, single pile, group of piles, pile-tunnel interaction
Procedia PDF Downloads 14417 Isolation of Antimicrobial Compounds from Marine Sponge Neopetrosia exigua
Authors: Haitham Qaralleh, Syed Z. Idid, Shahbudin Saad, Deny Susanti, Osama Althunibat
Abstract:
This study was carried out to isolate the active antimicrobial compounds from Neopetrosia exigua using bio-guided assay isolation against Staphylococcus aureus. N. exigua was extracted using methanol and subjected to liquid-liquid extraction using solvents with different polarity (n-hexane, carbon tetrachloride, dichloromethane, n-butanol and water). Purification of the active components of n-butanol and dichloromethane fractions was done using Sephadex LH-20 and reverse phase chromatography. Based on the biological guided fractionation results, dichloromethane and n-butanol fractions showed the highest antimicrobial activity. Purification of the active components of n-butanol and dichloromethane fractions yielded three compounds. The structure of the isolated compounds were elucidated and found to be 5-hydroxy-1H-indole-3-carboxylic acid methyl ester, cyclo-1`-demethylcystalgerone and avarol derivative. Avarol was showed potent bactericidal effect against S. aureus. N. exigua appears to be rich source of natural antimicrobial agents. Further studies are needed to investigate the mode of action of these compounds.Keywords: antimicrobial, avarol, Neopetrosia exigua, Staphylococcus aureus
Procedia PDF Downloads 43416 Improving the Frequency Response of a Circular Dual-Mode Resonator with a Reconfigurable Bandwidth
Authors: Muhammad Haitham Albahnassi, Adnan Malki, Shokri Almekdad
Abstract:
In this paper, a method for reconfiguring bandwidth in a circular dual-mode resonator is presented. The method concerns the optimized geometry of a structure that may be used to host the tuning elements, which are typically RF (Radio Frequency) switches. The tuning elements themselves, and their performance during tuning, are not the focus of this paper. The designed resonator is able to reconfigure its fractional bandwidth by adjusting the inter-coupling level between the degenerate modes, while at the same time improving its response by adjusting the external-coupling level and keeping the center frequency fixed. The inter-coupling level has been adjusted by changing the dimensions of the perturbation element, while the external-coupling level has been adjusted by changing one of the feeder dimensions. The design was arrived at via optimization. Agreeing simulation and measurement results of the designed and implemented filters showed good improvements in return loss values and the stability of the center frequency.Keywords: dual-mode resonators, perturbation theory, reconfigurable filters, software defined radio, cognitine radio
Procedia PDF Downloads 16715 Effect of Segregation Pattern of Mn, Si, and C on through Thickness Microstructure and Properties of Hot Rolled Steel
Authors: Waleed M. Al-Othman, Hamid Bayati, Abdullah Al-Shahrani, Haitham Al-Jabr
Abstract:
Pearlite bands commonly form parallel to the surface of the hot rolled steel and have significant influence on the properties of the steel. This study investigated the correlation between segregation pattern of Mn, Si, C and formation of the pearlite bands in hot rolled Gr 60 steel plate. Microstructural study indicated formation of a distinguished thick band at centerline of the plate with number of parallel bands through thickness of the steel plate. The thickness, frequency, and continuity of the bands are reduced from mid-thickness toward external surface of the steel plate. Analysis showed a noticeable increase of C, Si and Mn levels within the bands. Such alloying segregation takes place during metal solidification. EDS analysis verified presence of particles rich in Ti, Nb, Mn, C, N, within the bands. Texture analysis by Electron Backscatter Detector (EBSD) indicated the grains size/misorientation can noticeably change within the bands. Effect of banding on through-thickness properties of the steel was examined by carrying out microhardness, toughness and tensile tests. Results suggest the Mn and C contents are changed in sinusoidal pattern through thickness of the hot rolled plate and pearlite bands are formed at the peaks of this sinusoidal segregation pattern. Changes in grain size/misorientation, formation of highly alloyed particles, and pearlite within these bands, facilitate crack formation along boundaries of these bands.Keywords: pearlite band, alloying segregation, hot rolling, Ti, Nb, N, C
Procedia PDF Downloads 13814 The Prevalence and Impact of Anxiety Among Medical Students in the MENA Region: A Systematic Review, Meta-Analysis, and Meta-Regression
Authors: Kawthar F. Albasri, Abdullah M. AlHudaithi, Dana B. AlTurairi, Abdullaziz S. AlQuraini, Adoub Y. AlDerazi, Reem A. Hubail, Haitham A. Jahrami
Abstract:
Several studies have found that medical students have a significant prevalence of anxiety. The purpose of this review paper is to carefully evaluate the current research on anxiety among medical students in the MENA region and, as a result, estimate the prevalence of these disturbances. Multiple databases, including the CINAHL (Cumulative Index to Nursing and Allied Health Literature), Cochrane Library, Embase, MEDLINE (Medical Literature Analysis and Retrieval System Online), PubMed, PsycINFO (Psychological Information Database), Scopus, Web of Science, UpToDate, ClinicalTrials.gov, WHO Global Health Library, EbscoHost, ProQuest, JAMA Network, and ScienceDirect, were searched. The retrieved article reference lists were rigorously searched and rated for quality. A random effects meta-analysis was performed to compute estimates. The current meta-analysis revealed an alarming estimated pooled prevalence of anxiety (K = 46, N = 27023) of 52.5% [95%CI: 43.3%–61.6%]. A total of 62.0% [95% CI 42.9%; 78.0%] of the students (K = 18, N = 16466) suffered from anxiety during the COVID-19 pandemic, while 52.5% [95% CI 43.3%; 61.6%] had anxiety before COVID-19. Based on the GAD-7 measure, a total of 55.7% [95%CI 30.5%; 78.3%] of the students (K = 10, N = 5830) had anxiety, and a total of 54.7% of the students (K = 18, N = 12154) [95%CI 42.8%; 66.0%] had anxiety using the DASS-21 or 42 measure. Anxiety is a common issue among medical students, making it a genuine problem. Further research should be conducted post-COVD 19, with a focus on anxiety prevention and intervention initiatives for medical students.Keywords: anxiety, medical students, MENA, meta-analysis, prevalence
Procedia PDF Downloads 7313 Environment and Social Management Strategy at Kuwait Integrated Petroleum Industries Company
Authors: Hannan Al-Qanai, Haitham Mustafa, Rajeswaran Sivasankar
Abstract:
Kuwait Integrated Petroleum Industries Company (KIPIC, Company), established in 2016 as a subsidiary to Kuwait Petroleum Corporation (KPC), is responsible for operating and managing the largest grassroots integrated complex for refining, petrochemicals manufacture businesses, and liquefied natural gas import facilities at Al-Zour, Kuwait. KIPIC and its Contractors/sub-contractors employ over 69,000 staff in its current projects at Al-Zour during peak construction activity. KIPIC holds a unique responsibility to the society, which includes all stakeholders, and demonstrates its social commitment in developing an integrated environment & social management system (ESMS) and ensuring sustainability. This paper mainly demonstrates the knowledge on corporate branding from a corporate social responsibility (CSR) perspective and presents the achievements and best practices of KIPIC in the field of CSR and the challenges faced in handling social issues. Moreover, the study is based on qualitative data abstracted from KIPIC Health, Safety, Security & Environment Management System (HSSE MS) procedures, audit reports, the outcome of counseling sessions, national and international laws and regulations, and International Guidelines on Environment and Social Management System (ESMS). KIPIC has committed to caring for the environmental concerns and acting on social as they do on profits and economic growth. The main findings of this paper are that the successful implementation and operationalization of CSR within an organization depends on a simple but stringent process with both top-down and bottom-up commitment.Keywords: welfare, corporate social responsibility, social management, sustainability
Procedia PDF Downloads 21212 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Haitham Nabil Zaghlol Hasan
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: Egypt, archaeology, civilization, Egyptian
Procedia PDF Downloads 7511 The Digital Library and Its Influential Role in Developing the Establishment of the Grand Egyptian Museum
Authors: Haitham Magdy Hamad, Mohamed Ahmed Madkour
Abstract:
The essential role of the digital library in developing museum display methods, recording ancient Egyptian antiquities, facilitating scientific research, and storing antiquities in the Grand Egyptian Museum, which helped and saved a lot of time and money spent to equip the Grand Egyptian Museum. The technology of digital libraries, linking it to ancient Egyptian antiquities and the latest results, which scientific research has reached in the field of libraries and its impact on many areas of tourism and antiquities. The research also aims to show the main role of the digital library and the Arab countries emulating European countries in digitizing libraries and recent developments in Egyptian libraries and their role in many areas of life and linking them to Egyptology. The research will also explain how the museum display methods will be developed in the Grand Egyptian Museum, and the recording of ancient Egyptian antiquities in order to facilitate the process of scientific research and methods of storing antiquities will also work to save time and effort for researchers. The research will also deal with lighting and its prominent role in the display in the interior design and coordination of the Grand Egyptian Museum, through which the unique artifacts and artifacts displayed can be displayed, and they can be used in a strong or simple form. Depending on the condition of the piece to be displayed. The research will also go to show the role of the digital library in how the Grand Egyptian Museum contains gathering areas and how to distribute spaces, guidance, information, reception, libraries, lecture halls, restaurants, cafeterias, shops, permanent and temporary galleries, and bathrooms.Keywords: knowledge, library, culture, archaeology, grand Egyptian museum, numbering
Procedia PDF Downloads 7310 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Mohamed Ahmed Madkour, Haitham Magdy Hamad
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: archaeology, Egyptian kingdom era, graves, tombs, ancient Egyptian
Procedia PDF Downloads 719 The Impact of COVID-19 on Reconstructive Breast Surgery and Future Prospective
Authors: Amenah Galo, Mohammed Farid, Kareem Alsharkawy, Robert Warner, Karthikeyan Srinivasan, Haitham Khalil, Ruth Waters
Abstract:
Introduction: The cessation of elective surgery, particularly breast reconstruction, continue to be affected by the COVID-19 pandemic. The restructuring of medical services and staff redeployment severely affected the ability to return to normality for surgical specialties. The aim of this study is to determine the decline in breast reconstruction affected by the COVID-19 pandemic in a tertiary center. Methods: A retrospective review of breast reconstruction cases (autologous, non-autologous) or mastectomies Pre- COVID (March 2019-March 2020) and during COVID (March 2020- March 2021) at Queen Elizabeth Hospital, Birmingham, were collated. Data included patient demographics, BMI, previous and recent reconstruction, length of hospital stay, and mastectomies, including risk-reducing. Results: The number of patients who had breast reconstruction was significantly lower during COVID (n=62) compared to pre-COVID (n=199). The mean age (pre-COVID 51, COVID 59 years), BMI (Pre-COVID and COVID = 27), previous reconstruction (pre-COVID n=101, 51%, COVID n=33, 53%) and length hospital stay was less during COVID (3 days) compared to Pre-COVID (4 days). The proportion of risk-reducing mastectomies and reconstruction during COVID (32%, n=20) were higher than pre-COVID (21%, n=41). A higher proportion rate of autologous reconstruction (DIEP 56, TRAM 17) Pre-COVID compared to COVID (DIEP 22, TRAM 7). Implant reconstructions were higher during COVID (n=19, 31%) than pre-COVID (n=31, 16%). Conclusion: The lack of regular provision for breast reconstruction continues to decline during the pandemic. This will have a tremendous impact on waiting lists without a timeline for reconstruction to offer patients. An international survey highlights the disparities in offering breast reconstruction and strategies to rectify this issue.Keywords: breast reconstruction, COVID-19 pandemic, mastectomy, autologous, implant
Procedia PDF Downloads 2228 Spectra of Mahmoud Darwish: Argumentative Approach in the Poem "Identity Card"
Authors: Haitham Sarhan
Abstract:
The experience of Mahmoud Darwish’s poetry represents one of the leading Arabic creative experiences because of its cultural specificity which is linked to the question of Palestine and its people. The poet Mahmoud Darwish does not stop there, but also reaches out to the whole of the cosmic and openness of the universal human experience. His poetry is rooted in a creative period, and was able to surpass its time. Mahmoud Darwish’s poetry contains diverse metaphors and worlds of genres, which overextends from direct romance to the lattice resistance and further stretches to the imaginary world and to the grand narratives. The poem "Identity Card" was published in his collections "Olive Leaves" and was issued in 1963. This collection highlighted the poems which included a revolutionary position, and formed a 'manifesto' and the statement of the Palestinian resistance, which represented the league of poets of Palestine. This poem has contributed along with other poems in creating a flame of resistance and increased it in the hearts of the Palestinian people. It also exercised considerable influence in the Arab world through what has been wrought from emotional responses and revolutionary impact which still remains. Moreover, this poem has succeeded with other resistance poems and postmodern poets like Nizar Qabbani in bringing modern poetry and culturally transmitted it among the Arab peoples and the masses. In spite of the fact that the poet Mahmoud Darwish exceeded this poem creatively through his other great works, "Identity Card" still has a great effect on peoples past memory’s and present. This need to hear this poem in Mahmoud Darwish’s poetic readings reflects peoples frustration and anger. It is safe to say that it is enticing people to this present day. This revolutionary poem had and still has a magical effect on Arab world.Keywords: Arab contemporary poetry, identity, memory, argumentation
Procedia PDF Downloads 4357 Implementation of Enterprise Asset Management (E-AM) System at Oman Electricity Transmission Company
Authors: Omran Al Balushi, Haitham Al Rawahi
Abstract:
Enterprise Asset Management (eAM) has been implemented across different Generation, Transmission and Distribution subsidiaries in Nama Group companies. As part of Nama group, Oman Electricity Transmission Company (OETC) was the first company to implement this system. It was very important for OETC to implement and maintain such a system to achieve its business objectives and for effective operations, which will also support the delivery of the asset management strategy. Enterprise Asset Management (eAM) addresses the comprehensive asset maintenance requirements of Oman Electricity Transmission Company (OETC). OETC needs to optimize capacity and increase utilization, while lowering unit production. E-AM will enable OETC to adopt this strategy. Implementation of e-AM has improved operation performance with preventive and scheduled maintenance as well as it increased safety. Implementation of e-AM will also enable OETC to create optimal asset management strategy which will increase revenue and decrease cost by effectively monitoring operational data such as maintenance history and operation conditions. CMMS (Computerised Maintenance Management System) is the main software and the back-bone of e-AM system. It is used to provide an improved working practice to properly establish information and data flow related to maintenance activities. Implementation of e-AM system was one of the factors that supported OETC to achieve ISO55001 Certificate on fourth quarter of 2016. Also, full implementation of e-AM system will result in strong integration between CMMS and Geographical Information Systems (GIS) application and it will improve OETC to build a reliable maintenance strategy for all asset classes in its Transmission network. In this paper we will share our experience and knowledge of implementing such a system and how it supported OETC’s management to make decisions. Also we would highlight the challenges and difficulties that we encountered during the implementation of e-AM. Also, we will list some features and advantages of e-AM in asset management, preventive maintenance and maintenance cost management.Keywords: CMMS, Maintenance Management, Asset Management, Maintenance Strategy
Procedia PDF Downloads 1446 Surgical Imaging in Ancient Egypt
Authors: Mohamed Ahmed Madkour, Haitham Magdy Hamad
Abstract:
This research aims to study of the surgery science and imaging in ancient Egypt, and how to diagnose the surgical cases, whether due to injuries or disease that requires surgical intervention, Medical diagnosis and how to treat it. The ancient Egyptian physician tried to change over from magic and theological thinking to become a stand-alone experimental science, they were able to distinguish between diseases and they divide them into internal and external diseases even this division exists to date in modern medicine. There is no evidence to recognize the amount of human knowledge in the prehistoric knowledge of medicine and surgery except skeleton. It is not far from the human being in those times familiar with some means of treatment, Surgery in the Stone age was rudimentary, Flint stone was used after trimming in a certain way as a lancet to slit and open the skin. Wooden tree branches were used to make splints to treat bone fractures. Surgery developed further when copper was discovered, it led to the advancement of Egyptian civilization, then modern and advanced tools appeared in the operating theater like a knife or a scalpel. The climate and environmental conditions have preserved medical papyri and human remains that have confirmed their knowledge of surgical methods including sedation. The ancient Egyptians reached a great importance in surgery, evidenced by the scenes that depict the pathological image and the surgical process, but the image alone is not sufficient to prove the pathology, its presence in ancient Egypt and its treatment method. As there are a number of medical papyri, especially Edwin Smith and Ebris, which prove the ancient Egyptian surgeon's knowledge of the pathological condition that It requires a surgical intervention, otherwise its diagnosis and the method of treatment will not be described with such accuracy through these texts. Some surgeries are described in the department of surgery at Ebris papyrus. The level of surgery in ancient Egypt was high, and they performed surgery such as hernias and Aneurysm, however we have not received a lengthy explanation of the various surgeries and the surgeon has usually only said “treated surgically”. It is evident in the Ebris papyrus that they used sharp surgical tools and cautery in operations where bleeding is expected, such as hernias, arterial sacs and tumors.Keywords: ancient Egypt, archaeology, Egyptian history, ancient asurgical imaging, Egyptian civilization, civilization
Procedia PDF Downloads 825 Surgical Imaging in Ancient Egypt
Authors: Haitham Nabil Zaghlol Hasan
Abstract:
This research aims to study of the surgery science and imaging in ancient Egypt and how to diagnose the surgical cases, whether due to injuries or disease that requires surgical intervention, Medical diagnosis and how to treat it. The ancient Egyptian physician tried to change over from magic and theological thinking to become a stand-alone experimental science, they were able to distinguish between diseases, and they divide them into internal and external diseases even though this division exists to date in modern medicine. There is no evidence to recognize the amount of human knowledge in the prehistoric knowledge of medicine and surgery except skeleton. It is not far from the human being in those times familiar with some means of treatment, Surgery in the Stone age was rudimentary, Flint stone was used after trimming in a certain way as a lancet to slit and open the skin. Wooden tree branches were used to make splints to treat bone fractures. Surgery developed further when copper was discovered, it led to the advancement of Egyptian civilization, then modern and advanced tools appeared in the operating theater, like a knife or a scalpel, there is evidence of surgery performed in ancient Egypt during the dynastic period (323 – 3200 BC). The climate and environmental conditions have preserved medical papyri and human remains that have confirmed their knowledge of surgical methods, including sedation. The ancient Egyptians reached great importance in surgery, evidenced by the scenes that depict the pathological image and the surgical process, but the image alone is not sufficient to prove the pathology, its presence in ancient Egypt and its treatment method. As there are a number of medical papyri, especially Edwin Smith and Ebris, which prove the ancient Egyptian surgeon's knowledge of the pathological condition that It requires surgical intervention, otherwise, its diagnosis and the method of treatment will not be described with such accuracy through these texts. Some surgeries are described in the department of surgery at Ebris papyrus (recipes from 863 to 877). The level of surgery in ancient Egypt was high, and they performed surgery such as hernias and Aneurysm, however, we have not received a lengthy explanation of the various surgeries, and the surgeon has usually only said: “treated surgically”. It is evident in the Ebris papyrus that they used sharp surgical tools and cautery in operations where bleeding is expected, such as hernias, arterial sacs and tumors.Keywords: egypt, ancient_egypt, civilization, archaeology
Procedia PDF Downloads 694 Identification and Characterization of in Vivo, in Vitro and Reactive Metabolites of Zorifertinib Using Liquid Chromatography Lon Trap Mass Spectrometry
Authors: Adnan A. Kadi, Nasser S. Al-Shakliah, Haitham Al-Rabiah
Abstract:
Zorifertinib is a novel, potent, oral, a small molecule used to treat non-small cell lung cancer (NSCLC). zorifertinib is an Epidermal Growth Factor Receptor (EGFR) inhibitor and has good blood–brain barrier permeability for (NSCLC) patients with EGFR mutations. zorifertinibis currently at phase II/III clinical trials. The current research reports the characterization and identification of in vitro, in vivo and reactive intermediates of zorifertinib. Prediction of susceptible sites of metabolism and reactivity pathways (cyanide and GSH) of zorifertinib were performed by the Xenosite web predictor tool. In-vitro metabolites of zorifertinib were performed by incubation with rat liver microsomes (RLMs) and isolated perfused rat liver hepatocytes. Extraction of zorifertinib and it's in vitro metabolites from the incubation mixtures were done by protein precipitation. In vivo metabolism was done by giving a single oral dose of zorifertinib(10 mg/Kg) to Sprague Dawely rats in metabolic cages by using oral gavage. Urine was gathered and filtered at specific time intervals (0, 6, 12, 18, 24, 48, 72,96and 120 hr) from zorifertinib dosing. A similar volume of ACN was added to each collected urine sample. Both layers (organic and aqueous) were injected into liquid chromatography ion trap mass spectrometry(LC-IT-MS) to detect vivozorifertinib metabolites. N-methyl piperizine ring and quinazoline group of zorifertinib undergoe metabolism forming iminium and electro deficient conjugated system respectively, which are very reactive toward nucleophilic macromolecules. Incubation of zorifertinib with RLMs in the presence of 1.0 mM KCN and 1.0 Mm glutathione were made to check reactive metabolites as it is often responsible for toxicities associated with this drug. For in vitro metabolites there were nine in vitro phase I metabolites, four in vitro phase II metabolites, eleven reactive metabolites(three cyano adducts, five GSH conjugates metabolites, and three methoxy metabolites of zorifertinib were detected by LC-IT-MS. For in vivo metabolites, there were eight in vivo phase I, tenin vivo phase II metabolitesofzorifertinib were detected by LC-IT-MS. In vitro and in vivo phase I metabolic pathways wereN- demthylation, O-demethylation, hydroxylation, reduction, defluorination, and dechlorination. In vivo phase II metabolic reaction was direct conjugation of zorifertinib with glucuronic acid and sulphate.Keywords: in vivo metabolites, in vitro metabolites, cyano adducts, GSH conjugate
Procedia PDF Downloads 1983 Maintenance Work Order Management Tool (Desktop & Mobile Solution)
Authors: Haitham Al Rawahi
Abstract:
Oman Electricity Transmission Company (OETC) has implemented Computerized Maintenance Management System (CMMS), which is based on Oracle enterprise asset management model e-AM. This was implemented with cooperation of Nama Shared Services (NSS). CMMS is mainly used to create maintenance work orders with a preconfigured workflow of defined maintenance schedules/plans, required resources, and materials, obtaining shutdown approvals, completing maintenance activities, and closing the work orders. Furthermore, CMMS is also configured with asset failure classifications, asset hierarchy, asset maintenance activities, integration with spare inventories, etc. Since the year 2017, site engineer is working on CMMS by filling-in manually all related maintenance and inspection records on paper forms and then scanning and attaching it in CMMS for further analysis. Site engineer will finalize all paper works at site and then goes back to office to scan and attach it to work order in CMMS. This creates sub tasks for site engineer and makes it very difficult and lengthy process. Also, there is a significant risk for missing or deleted important fields on the paper due to usage of pen to fill the paper. In addition to that, site engineer may take time and days working outside of the office. therefore, OETC has decided to digitize these inspection and maintenance forms in one platform in CMMS, and it can be opened with both functionalities online and offline. The ArcGIS product formats or web-enabled solutions which has ability to access from mobile and desktop devices via arc map modules will be used too. The purpose of interlinking is to setup for maintenance and inspection forms to work orders in e-AM, which the site engineer has daily interactions with. This ArcGIS environment or tool is designed to link with e-AM, so when site engineer opens this application from the site and a window will take him through same ArcGIS. This window opens the maintenance forms and shows the required fields to fill-in and save the work through his mobile application. After saving his work with the availability of network (Off/In) line, notification will trigger to his line manager to review and take further actions (approve/reject/request more information). In this function, the user can see the assigned work orders to his departments as well as chart of all work orders with status. The approver has ability to see the statistics of all work.Keywords: e-AM, GIS, CMMS, integration
Procedia PDF Downloads 972 Imputation of Incomplete Large-Scale Monitoring Count Data via Penalized Estimation
Authors: Mohamed Dakki, Genevieve Robin, Marie Suet, Abdeljebbar Qninba, Mohamed A. El Agbani, Asmâa Ouassou, Rhimou El Hamoumi, Hichem Azafzaf, Sami Rebah, Claudia Feltrup-Azafzaf, Nafouel Hamouda, Wed a.L. Ibrahim, Hosni H. Asran, Amr A. Elhady, Haitham Ibrahim, Khaled Etayeb, Essam Bouras, Almokhtar Saied, Ashrof Glidan, Bakar M. Habib, Mohamed S. Sayoud, Nadjiba Bendjedda, Laura Dami, Clemence Deschamps, Elie Gaget, Jean-Yves Mondain-Monval, Pierre Defos Du Rau
Abstract:
In biodiversity monitoring, large datasets are becoming more and more widely available and are increasingly used globally to estimate species trends and con- servation status. These large-scale datasets challenge existing statistical analysis methods, many of which are not adapted to their size, incompleteness and heterogeneity. The development of scalable methods to impute missing data in incomplete large-scale monitoring datasets is crucial to balance sampling in time or space and thus better inform conservation policies. We developed a new method based on penalized Poisson models to impute and analyse incomplete monitoring data in a large-scale framework. The method al- lows parameterization of (a) space and time factors, (b) the main effects of predic- tor covariates, as well as (c) space–time interactions. It also benefits from robust statistical and computational capability in large-scale settings. The method was tested extensively on both simulated and real-life waterbird data, with the findings revealing that it outperforms six existing methods in terms of missing data imputation errors. Applying the method to 16 waterbird species, we estimated their long-term trends for the first time at the entire North African scale, a region where monitoring data suffer from many gaps in space and time series. This new approach opens promising perspectives to increase the accuracy of species-abundance trend estimations. We made it freely available in the r package ‘lori’ (https://CRAN.R-project.org/package=lori) and recommend its use for large- scale count data, particularly in citizen science monitoring programmes.Keywords: biodiversity monitoring, high-dimensional statistics, incomplete count data, missing data imputation, waterbird trends in North-Africa
Procedia PDF Downloads 1561 Evaluating the Impact of Nursing Protocols on External Ventricular Drain Infection Control in Adult Neurosurgery Patients with External Ventricular Drainage at Directorate General of Khoula Hospital ICU, Oman: A Cluster-Randomized Trial
Authors: Shamsa Al Sharji, Athar Al Jabri, Haitham Al Dughaishi, Mirfat Al Barwani, Raja Al Rawahi, Raiya Al Rajhi, Shurooq Al Ruqaishi, Thamreen Al Zadjali, Iman Al Humaidi
Abstract:
Background: External Ventricular Drains (EVDs) are critical in managing traumatic brain injuries and hydrocephalus by controlling intracranial pressure, but they carry a high risk of infection. Infection rates vary globally, ranging from 5% to 45%, leading to increased morbidity, prolonged hospital stays, and higher healthcare costs. Nursing protocols play a pivotal role in reducing these infection rates. This study investigates the impact of a structured nursing protocol on EVD-associated infections in adult neurosurgery patients at the Directorate General of Khoula Hospital, Oman, from January to September 2024. Methods: A cluster-randomized trial was conducted across neurosurgery wards and the ICU. The intervention group followed a comprehensive nursing protocol, including strict sterile insertion, standardized dressing changes, infection control training, and regular clinical audits. The control group received standard care. The primary outcome was the incidence of EVD-associated infections, with secondary outcomes including protocol compliance, infection severity, recovery times, length of stay, and 30-day mortality. Statistical analysis was conducted using Chi-square tests, paired t-tests, and logistic regression to assess the differences between groups. Results: The study involved 75 patients, with an overall infection rate of 13.3%. The intervention group showed a reduced infection rate of 8.9% compared to 20% in the control group. Compliance rates for key nursing actions were high, with 89.7% for hand hygiene and 86.2% for wound dressing. The relative risk of infection was 0.44 in the intervention group, reflecting a 55.6% reduction. Logistic regression identified obesity as a significant predictor of EVD infections. Although mortality rates were slightly higher in the intervention group, the number needed to treat (NNT) of 9 suggests that the nursing protocol may improve survival outcomes. Conclusion: This study demonstrates that structured nursing protocols can reduce EVD-related infections and improve patient outcomes in neurosurgery. While the findings are promising, further research with larger sample sizes is needed to confirm these results and optimize infection control strategies in neurosurgical care.Keywords: EVD, CSF, nursing protocol, EVD infection
Procedia PDF Downloads 25