Background: the condition of hallux valgus is considered as the most common deformities affecting females more than males, characteristically manifested as lateral deviation of the big toe and widening of first and second inter -metatarsal angle with a deformity of second toe in some severe cases. Objective: to make a radiological and clinical assessment of two surgical methods of osteotomy used in treatment of hallux valgu and to compare between them: first one is the distal dome osteotomy, and second one is a distal wedge metatarsal osteotomy. Patients and methods: a total of 36 feet of 28 patients suffer from hallux valgus, with mean age of 50.3 years were included in this study, followed for 6- 30 months ( mean follow-up of 8.8 months). Nineteen feet treated by dome osteotomy and seventeen feet treated by wedge osteotomy. All the cases were evaluated by the american orthopedics foot and ankle society (aofas) score, also, through the hallux valgus angle and intermetatarsal angle, both before and after surgery. Results: by dome osteotomy, the preoperative mean result of aofas score was about 45.7, with hallux valgus angle (hva) of 33.2o and intermetatarsal angle (IMA) of 11.7º. Postoperatively, the mean result of AOFAS score was 82.8, with HVA of 14.3º and IMA of 7º, with about 94.7% satisfactory results. In the other hand, the method of wedge osteotomy showed a preoperative mean result for AOFAS score of 45.2, with HVA of 34º and IMA of 12.8º , compared with postoperative mean result of AOFAS score of about 80.7, with HVA of 15.8º and IMA of 7.7º, with about 82.8 % satisfactory results. Conclusions: the two methods of osteotomy were used with very good outcome in radiological and clinical treatment of hallux valgus. :
Purpose: This study's objective is to assess this relationship in the context of the banking industry in Iraq. The human resources management practices (HRMPs) Theoretical framework: in this study included recruiting and selection, training and development, performance appraisal, compensation and reward to testing relationship HRMPs. Design/methodology/approach: in this study; We analysed by used a quantitative approach, and 246 employees were selected as a sample and given a questionnaire. The SPSS software was used to examine the data that were obtained from the questionnaire. Findings: The study's findings revealed a variety of hypotheses and conclusions, including the following: competitive advantage (CA) is positively impacted by
... Show MoreAsset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques
... Show MoreSoftware-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they accou
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreAbstract
The research aims to investigate the existence of correlations and influence between agricultural insurance risk management and economic development in the National Insurance Company with farmers, as agriculture is one of the leading branches of the national economy, ensuring food security and eliminating poverty to ensure sustainable ec
... Show MoreThe research aims at identifying the extent to which the top management in the organization is interested in managing the talents of its employees, through which it can face the competing organizations, as well as the great challenges faced by all organizations in recent years. The task of attracting and maintaining talented human resources is one of the biggest challenges facing Organizations
... Show More