Background: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c
... Show MoreBackground: Endometrial Cancer (EC) is the malignant tumor originating from endometrium cell (lining of the uterus). EC incidence and mortality have increased in recent years. Routinely used methods for EC diagnosis and treatment are histopathological tissue culture after surgery and postoperative radiotherapy, however there is still not enough efficient treatment for recurrence or progression of this disease. So, there is a critical need for further EC identification by new biological ways for the prognostic diagnosis of it. Objective: This study aimed to look for ways by which could help in diagnosis of EC before the hysterectomy. Materials and Methods: 55 patients with EC and 57 healthy women were involved in this study (up to 45 years)
... Show MoreInfection of the gastric mucosa with Helicobacter pylori is strongly associated with chronic gastritis, peptic ulcer and gastric cancer. Helicobacter pylori virulence factors include a variety of proteins that are involved in its pathogenesis, such as VacA and CagA. Another group of virulence factors is clearly important for colonization of H.pylori in the gastric mucosa. These include urease, motility factors (flagellin), and Superoxide dismutase (SOD). Because of this organism's microaerophilic nature and the increased levels of reactive oxygen in the infected host, we expect that other factors involved in the response to oxidative stress are likely to be required for virulence. Superoxide dismutase is a near
... Show MoreBackground: Gallstone disease (GSD) is a significant global health burden with variable prevalence influenced by metabolic, genetic, and infectious factors. Increasing evidence suggests that Gram-positive bacteria, particularly Staphylococcus aureus and Enterococcus species, contribute to gallstone pathogenesis through enzymatic activity and biofilm formation. Objectives: To characterize Gram-positive bacteria within gallstones from Iraqi patients, evaluate their biofilm-forming capacity, and analyze the relationship between bacterial colonization, gallstone type, and cholesterol levels. Methods: A total of 100 gallstones were obtained from patients undergoing elective cholecystectomy between October 2024 and March 2025. Stones were
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show More