Preferred Language
Articles
/
Rxe9h5IBVTCNdQwCerNw
Orbital varices: Epidemiology, clinical presentation, and treatment outcomes – A scoping review
...Show More Authors
Background:

Orbital varices are vein dilations in the orbit presenting various symptoms. This scoping review synthesizes existing evidence on their epidemiology, clinical features, and treatment efficacy.

Methods:

Literature was reviewed according to Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines. PubMed and Scopus were searched until April 31, 2024, for articles on clinically diagnosed ocular varices detailing diagnostic methods, treatments, and outcomes. Exclusions were reviews, animal studies, and incomplete case reports. Data on study characteristics, diagnosis, management, and outcomes were extracted and assessed for quality and bias.

Results:

Eight studies met the inclusion criteria, with sample sizes ranging from 4 to 30 and ages from 1 to 87 years. Diagnostic tools included magnetic resonance imaging and computed tomography, while treatments ranged from conservative methods to invasive procedures and radiosurgery. Notably, higher symptom resolution rates were associated with observational strategies and minimally invasive surgeries. However, Gamma Knife radiosurgery, although promising, posed risks of vision impairment in some cases.

Conclusion:

The management of orbital varices has evolved significantly with newer, less invasive techniques improving outcomes and reducing recovery times. Despite advancements, challenges such as disease recurrence and the need for personalized treatment regimens persist, underscoring the ongoing need for research to refine and standardize treatment approaches.

Scopus Crossref
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Thu Feb 20 2020
Journal Name
Iraqi Poultry Sciences Journal
A precision use of thermostat in livestock monitoring system in a poultry house
...Show More Authors

Nowadays, many new technologies developed in a lot of countries. These technologies are promising in many areas such as environmental monitoring, precision agriculture as well as in animal production. The purpose of this study was to define a better understanding of how new and advanced technologies affect the agriculture and livestock sector alike. Although agriculture and animal husbandry are among the most important sectors, advanced equipment and information technology cannot be used adequately. This situation leads to low production efficiency. It is also known that there can be a significant difference in temperature between the position of the climate control sensor (room temperature) and the area occupied by the animal. This study e

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
HONOUR " IN SOMERSET MAUGHAM 'S A MAN OF HONOUR MAUGHAM AS A DRAMATIST
...Show More Authors

Somerset Maugham is known mainly as a novelist . This paper presents Maugham the dramatist . Many critics have found him a promising dramatist . He has written 30 plays , then he turns his back upon the theater and writes his autobiographical and most successful novel Of Human Bondage ( 1915) .

        Maugham's writing is clear , precise , and simple . He is described as a realist who is keenly aware of human nature , its concentration and frustration . His only tragedy A Man of Honour is a play in 4 acts . This paper concentrates mainly on this play to show Maugham as a dramatist and to show his concept of " honour " .

     &nb

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 27 2021
Journal Name
Route Educational & Social Science Journal
A STYLISTIC ANALYSIS OF ADVERTISING DISCOURSE: A CASE STUDY OF FACEBOOK COMMERCIAL ADVERTISEMENT
...Show More Authors

BN Rashid

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Design of a PID-Lead Compensator for a Twin Rotor Aerodynamic System (TRAS)
...Show More Authors

This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Time-Cost Trade-off to Manage A Project in a Fuzzy Environment
...Show More Authors

In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Aeroelastic Behavior of a Wind Turbine Blade by a Fluid -Structure Interaction Analysis
...Show More Authors

In this paper, a numerical model for fluid-structure interaction (FSI) analysis is developed for investigating the aeroelastic response of a single wind turbine blade. The Blade Element Momentum (BEM) theory was adopted to calculate the aerodynamic forces considering the effects of wind shear and tower shadow. The wind turbine blade was modeled as a rotating cantilever beam discretized using Finite Element Method (FEM) to analyze the deformation and vibration of the blade. The aeroelastic response of the blade was obtained by coupling these aerodynamic and structural models using a coupled BEM-FEM program written in MATLAB. The governing FSI equations of motion are iteratively calculated at each time step, through exchanging data between

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref