Preferred Language
Articles
/
FRatSIcBVTCNdQwCskJb
Pros and Cons of the Transconjunctival Retroseptal Approach to the Isolated Orbital Floor Fracture
...Show More Authors

To get access into the orbital floor 3 paths are commonly used which are transconjunctival, subciliary and subtarsal approaches. Each one of these approaches has its advantages and disadvantages. The study assessed the outcomes of the transconjunctival retroseptal approach, which reflects our experience in this type of surgery. Along 8 years, 26 patients received in the emergency room diagnosed with pure isolated orbital floor fractures, all of them admitted to the maxillofacial surgery department and approached by transconjunctival incision without lateral canthotomy. Three types of complications occurred: laceration of the lower eyelid, injury to the lacrimal system and entropion. All of these complications were managed accordingly with no long-term deficit. Although the transconjunctival approach without lateral canthotomy is limited to a certain degree, it has the advantages of hidden scar, easy, and short time to achieve.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Biological Effect of Different Concentrations of Bacillus Thurngensis Isolated From The Soils of Sawa Lake, Al Muthanna Governorate on The of Hypera postica at Different Time Periods
...Show More Authors
Abstract<p>This study conduct in Al-Muthanna governorate to assess five concentrations of <italic>Bacillus</italic> thurngensisagonist <italic>Hyperapostica</italic>. The results showed the presence of <italic>Bacillus thurngensisin</italic> all the studied sites of Lake Sawa in Muthanna Governorate, and the rates of its presence were close to the same sites, and the rate of its presence in those sites was 35%, and its highest rate was recorded in the north and east of the lake, as it reached 40% and the lowest amounted to 30% in the two sites south and west site. The results of the study showed that five concentrations were taken from bacterial isolates of <it></it></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Role of the Arab oil to the achievement of Economic security in the Arab: The Role of the Arab oil to the achievement of Economic security in the Arab
...Show More Authors

Abstract:
This research aims to the importance of oil in achieving economic
security in the Arab. Oil is not an ordinary subject and returns it significance to
the followings:
1. The importance of skipping a source of energy.
2. The importance of oil as raw material for petrochemical industry.
3. The importance of the oil sector as an area of foreign investment
4. The importance of oil in the marketing activities, transport, insurance
and various services
In addition to the importance of oil in general and the Arab oil has
additional strategic advantages such as geographic location, And the
magnitude of reserves and production of heavy investment costs are relatively
simple, And the ability to meet the

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed May 07 2025
Journal Name
Al-anbar University Journal Of Law And Political Sciences
Evaluation of the Geneva Conventions of 1949 and the role of the protecting power to implement its provisions
...Show More Authors

View Publication
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
Public Rights and Freedoms in the Constitution of the Sultanate of Oman and Ways to Protect Them
...Show More Authors

What distinguishes human rights issues is their importance to the international community and their importance to democratic political regimes, because they are the axis of any political regime that seeks to achieve a successful democratic path and a stable state. So, countries that are interested in human rights try to enshrine those rights and freedoms in their constitutions and reinforce their concepts in their laws and legislations. Not to mention its involvement in international conventions and treaties concerned with human rights and freedoms, and this is what the Sultanate of Oman has worked on and confirm in the provisions of its 1996 constitution and its amendments

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Obstacles to the adoption of business commercial books to determine taxable income and ways to address them: An applied research at The General Commission for Taxes
...Show More Authors

The research aims to shed light on the obstacles that hinder the use of taxpayers' commercial books covered by provisions of the amended commercial book-keeping system No. 2 of 1985 and ways to address these obstacles. On this basis, the main null hypothesis was formulated that there is no statistically significant relationship between the obstacles to the adoption of the commercial books and taxable income.

The research data were collected on the base of three applied case studies of registered taxpayers in the General Commission of Taxes, GCT, together with the use of a questionnaire distributed to a sample of taxpayers ( companies ). The collected data were analyzed, the result  were presented  and the hypothesis was

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Biochemical And Cellular Archives
Determination of Beta Lactam Resistance of Klebsiella pneumoniae isolated from clinical specimens and water samples
...Show More Authors

Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Iraqi J Of Agricultural Science
Determination of Beta Lactam Resistance of Klebsiella Pneumoniae Isolated from Clinical Specimens and Water Samples
...Show More Authors

Scopus (3)
Scopus
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
Meta-Motivation and its Relationship to the Uniqueness Seeking of the Engineering Colleges Students
...Show More Authors

The current study aims to identify:The meta-motivation and Uniqueness seeking of the study sample. The correlated  relationship among them. The present study sample consists of (400) students from the colleges of engineering, University of Baghdad, and the University of Technology in the academic year (2019-2020), and the researcher has adopted the Chen Scale (1995)to measure the meta-motivation after its translation into Arabic by(Al-Samawi,2011).The scale includes six dimensions. The researcher has also adopted the Snyder&Fromkin scale (1980) to measure the uniqueness  seeking after translating and adapting it into the Arabic environment. The scale consists of three dimensions. The results show that students of the Facult

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More