Preferred Language
Articles
/
VRdvspIBVTCNdQwCu74H
Type IV Flexor Digitorum Profundus Avulsion: A Case Report
...Show More Authors

Abstract The avulsion of the flexor digitorum profundus, also known as the jersey finger, is a well-known injury that can be treated surgically. It has been classified into four types, among them type IV which involves tendon avulsion from an associated bony fragment with subsequent retraction to the palm or proximal interphalangeal joint is very rare. We present a case of type IV injury in a 45-year-old man with a pulling-on injury. The repair followed a pull-out technique (reinserting the tendon into the avulsed fragment); the entire reduction was tied over a button on the dorsal aspect of the nail and was augmented with a volar plate. The case was reported due to its rarity. We found that early surgical management of this problem greatly facilitates optimum surgical results and that early rehabilitation is essential for good long-term results.

Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
A Study of Parameters Affecting the Solvent Extraction-Flocculation Process of Used Lubricating Oil
...Show More Authors

The aim of this study was to investigate the effect of operating variables on, the percentage of removed sludge (PSR) obtained during re-refining of 15W-40 Al-Durra spent lubricant by solvent extraction-flocculation treatment method. Binary solvents were used such as, Heavy Naphtha (H.N.): MEK (N:MEK), H.N. : n-Butanol (N:n-But), and H.N. : Iso-Butanol (N:Iso:But). The studied variables were mixing speed (300-900, rpm), mixing time (15-60, min), and operating  temperature (2540, oC). This study showed that the studied operating variables have effects where, increasing the mixing time up to 45 min for H.N.: MEK, H.N.: n-Butanol  and 30 min for H.N.: Iso-Butanol increased the PSR, after that percentage was decreased; increasing t

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2011
Journal Name
Journal Of Planner And Development
Architectural void is a revolution in the formation of the facades of digital architecture
...Show More Authors

Architecture has evolved through the ages as forms, relationships, materials and mechanisms according to the data of each era and up to the era of digital technology, where the change in proportions and aesthetic dimensions of contemporary architectural formation due to the capabilities of digitization has created innovative plastic properties using the void formation in the facades and the introduction of void as a formative and aesthetic element, which led to The emergence of new creative concepts and ideas that contradict traditional ideas and are consistent with the spirit of the times, led to a revolution in the world of architectural form at the level of (architectural ideas and the generation of shapes, materials and construction

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Soil Effect on Subsidence in Area of Al- Karkh District A Geomorphologic Study
...Show More Authors

Soil is considered one of the main factors of subsidence phenomena which
became continually happen in Baghdad (Ghazalia, Ameria, and Hay al-Amyl)
causing bad effects as shortage of drinking water, traffic jam and formation
swamps.
This thesis depends on soil study to a depth 15 meters, due to its
importance in subsidence. This done through specifying its chemical physical
properties.
Soil within Iraq climate, in case of water stopping for any reason it contract
and shrink away especially when it exposed to high pressure these factors
finally caused subsidence. In case of leakage underground water or that of
damaged water pipes this will contribute to chemical reactions which damage soil
structure and incr

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Computer Applications
Enhancing the Delta Training Rule for a Single Layer Feedforward Heteroassociative Memory Neural Network
...Show More Authors

In this paper, an algorithm is suggested to train a single layer feedforward neural network to function as a heteroassociative memory. This algorithm enhances the ability of the memory to recall the stored patterns when partially described noisy inputs patterns are presented. The algorithm relies on adapting the standard delta rule by introducing new terms, first order term and second order term to it. Results show that the heteroassociative neural network trained with this algorithm perfectly recalls the desired stored pattern when 1.6% and 3.2% special partially described noisy inputs patterns are presented.

Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
A New Spectrophotometric Method for Analysis of Allopurinol in Aqueous Solutions and Pharmaceutical Preparations
...Show More Authors

A new method for determination of allopurinol in microgram level depending on its ability to reduce the yellow absorption spectrum of (I-3) at maximum wavelength ( ?max 350nm) . The optimum conditions such as "concentration of reactant materials , time of sitting and order of addition were studied to get a high sensitivity ( ? = 27229 l.mole-1.cm-1) sandal sensitivity : 0.0053 µg cm-2 ,with wide range of calibration curve ( 1 – 9 µg.ml-1 ) good stability (more then24 hr.) and repeatability ( RSD % : 2.1 -2.6 % ) , the Recovery % : ( 98.17 – 100.5 % ) , the Erel % ( 0.50 -1.83 % ) and the interference's of Xanthine , Cystein , Creatinine , Urea and the Glucose in 20 , 40 , 60 fold of analyate were also studied .

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
A comparative taxonomic study of seeds of some plants of rosaceae family in Iraq
...Show More Authors

Preview PDF
Scopus
Publication Date
Thu Jul 08 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
Civil Protection of Rights contiguous to Author’s Royalty in Iraqi Law A comparative study
...Show More Authors

Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref