Retained soft tissue foreign bodies following injuries are frequently seen in the Emergency and Plastic Surgery practice. The patients with such presentations require a watchful and detailed clinical as- sessment to overcome the anticipant possibility of missing them. However, the diagnosis based on the clinical evaluation is usually challenging and needs to be supported by imaging modalities that are suboptimal and may fail in identifying some types of foreign bodies. Owing to that, serious complications such as chronic pain, infection, and delayed wound healing can be faced that necessitate a prompt intervention to halt those detrimental consequences. The classical method of removal is a surgical exploration which is not free of risks.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th
... Show MoreThe aim of organizational contemporary is development man power active, in spit-of there are littlie resources. But in the Iraqi environment there are too much resources with performance inhabiting. specially in the ministry of water resources (sample of this research), about dryness and lower levels of rivers. There for this study have some important variable, it is ethical leadership & transformational leadership as (independent variable), and Perceived organizational support(dependent variable). Over here to invest with authority on the problem of research, is weakness harmony between employed perception and the pattern of leadership. We find decline in of reaction of organ compound between the variable to weaken high perf
... Show MoreWith the advent of the globalization, the rapid development in technology and the intensity of competition companies attemptto maintain competition advantages and retain customers. The traditional methods in managerial accounting become irrelevance to achieve the objectives of these companies especially with the rapid changes in modern manufacturing environment .Thus there is a need to new tools in accounting such as lean accounting, which is considered as a costing method that support creating value for the customer by costing the entire value stream, eliminating waste in the accounting process, reduced lead time, improved quality, lowered time delivery and increased available capacity. Using value stream focuses not only on the waste&n
... Show More