Preferred Language
Articles
/
exfzfI4BVTCNdQwCMkqN
Ruptured giant aneurysm of a cortical middle cerebral artery: A case report
...Show More Authors
Background:

Aneurysms of the cortical branches of the middle cerebral artery (MCA) are rare. They usually are secondary to traumatic or infectious etiologies and are rarely idiopathic. The specific characteristics of idiopathic aneurysms in such location are not well defined in the literature. The authors report a rare case of a ruptured giant idiopathic cortical MCA aneurysm with review of the available literature on this clinical entity.

Case Description:

A 24-year-old female presented with headache, disturbed level of consciousness, and right-sided weakness. Imaging studies showed a left frontoparietal intracerebral hematoma and a giant saccular aneurysm in the posterior parietal cortical branch of the MCA. The patient had no history of head trauma or active infection; therefore, the aneurysm was considered idiopathic. A microsurgical clipping of the aneurysm with evacuation of the hematoma was performed. There were no surgical complications, and the patient achieved a good outcome modified Rankin Scale of 1 with no neurological deficits.

Conclusion:

Idiopathic aneurysms of the cortical branches of the MCA are rare, and usually present with intraparenchymal hemorrhage due to rupture. There is no clear consensus regarding the optimal management strategy. This case shows that timely management can lead to good outcomes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (63)
Crossref (56)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
A survey on video compression fast block matching algorithms
...Show More Authors

View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Ranking Function to Solve a Fuzzy Multiple Objective Function
...Show More Authors

In this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better

View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel Water Quality Index for Iraqi Surface Water
...Show More Authors

The study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 27 2022
Journal Name
Al–bahith Al–a'alami
Motives for public exposure to advertisement through smart phone applications and its purchasing decisions relationship (A research drawn from a Master Degree thesis)
...Show More Authors

Advertisement on smart phone shopping apps are a new way of driving users to satisfy their needs and influence their purchasing decisions, In this way, the research could be aimed to know The role of the relationship between the motivations for audience exposure to shopping apps advertisement and purchasing decisions, In order to achieve the objectives of the research, the researcher adopted the survey method and used the questionnaire and the scale to collect data and information, The researcher chose the "random sample multi stages", The sample size was (475) respondents from Baghdad city center (18 years and above) women and men.

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Axiology of Electronic programs in updating the methodology of information and communication sciences Tropes 8.4 Case Study
...Show More Authors

The study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult

... Show More
View Publication Preview PDF
Crossref