Background: the condition of hallux valgus is considered as the most common deformities affecting females more than males, characteristically manifested as lateral deviation of the big toe and widening of first and second inter -metatarsal angle with a deformity of second toe in some severe cases. Objective: to make a radiological and clinical assessment of two surgical methods of osteotomy used in treatment of hallux valgu and to compare between them: first one is the distal dome osteotomy, and second one is a distal wedge metatarsal osteotomy. Patients and methods: a total of 36 feet of 28 patients suffer from hallux valgus, with mean age of 50.3 years were included in this study, followed for 6- 30 months ( mean follow-up of 8.8 months). Nineteen feet treated by dome osteotomy and seventeen feet treated by wedge osteotomy. All the cases were evaluated by the american orthopedics foot and ankle society (aofas) score, also, through the hallux valgus angle and intermetatarsal angle, both before and after surgery. Results: by dome osteotomy, the preoperative mean result of aofas score was about 45.7, with hallux valgus angle (hva) of 33.2o and intermetatarsal angle (IMA) of 11.7º. Postoperatively, the mean result of AOFAS score was 82.8, with HVA of 14.3º and IMA of 7º, with about 94.7% satisfactory results. In the other hand, the method of wedge osteotomy showed a preoperative mean result for AOFAS score of 45.2, with HVA of 34º and IMA of 12.8º , compared with postoperative mean result of AOFAS score of about 80.7, with HVA of 15.8º and IMA of 7.7º, with about 82.8 % satisfactory results. Conclusions: the two methods of osteotomy were used with very good outcome in radiological and clinical treatment of hallux valgus. :
This research is a modest contribution to Put the finishing touches on therole of managerial leaders represented by static companies belonging to theministry of transport and communication/ [iraq] . the research has adopted thedescriptive. Analytical methodology and field study technique, using thequestionnaire as a tool for data collection [58] forms Nar, been distributed tothe research sample. The sample has been deliberately selected {generalmanager, as assistant general manager and heads of department}. Thequestionnaires and the main hypotheses of represented by the existence ofsignificant correlation and impact between successful managerial leadershipand crisis management using the software {SPSS}, were analyzed. Resultswere identic
... Show MoreAbstract
This research aims to highlight the Cooperate Governance concept and determine its accounting dimensions, especially what has connected with development the management accountant role concerning the nature, scope and its location in the organizational structure in the companies as to be complied with implementing the cooperate governance principles and mechanisms in the modern businesses environment. This research has focus on clear shortage in the management accountant role in the companies, regarding to implement the governance mechanisms, especially his role to provide the information and consultations to the internal & external parties (stakeholders) . This
... Show MoreThis study investigates the role of Enterprise Resources Planning (ERP) systems in improving human resources management (HRM) processes. The rapid environmental changes led to increased demand on the ERP systems, which have changed the manual effort to technology-based processes, providing solutions focusing on the integration of all departments to achieve goals for the entire organization. HRM processes are mainly made up of two classes: strategic and operational HRM. An ERP system works to integrate both of them, making HRM processes more efficient, effective and feasible to provide support to the organization as a whole (inside and outside). In this article, a modest framework is proposed to describe HRM process integrity in relation to
... Show MoreThe purpose of this paper is to understand the best processes that are currently used in managing talent in Australian higher education (HE) and to examine the policies in terms of talent management processes (TMPs) that are derived from objective one. Pragmatic benefits for academic institutions focused on enhancing talent.
This study selects the mixed method as its research design. In the qualitative study, there were three methods: brainstorming, focus group and individual interviews, followed by the quantitative questionnaire
The use of non-parametric models and subsequent estimation methods requires that many of the initial conditions that must be met to represent those models of society under study are appropriate, prompting researchers to look for more flexible models, which are represented by non-parametric models
In this study, the most important and most widespread estimations of the estimation of the nonlinear regression function were investigated using Nadaraya-Watson and Regression Local Ploynomial, which are one of the types of non-linear
... Show MoreBackground: Chronic otitis media (COM) of mucosal or squamous type is a common problem in otolaryngology practice, the active form of COM is characterized by discharge of pus and is treated by antibiotics to start with, the appropriate antibiotic should be prescribed to avoid antibiotic abuse and guarantee good outcome. Objectives:The objective of this study is to identify the causative organisms of active chronic active otitis media both (mucosal, squamous) type and test their sensitivity to various anti- microbial agents &compare with abroad studies.Methods:A prospective study was done on eighty patients, different ages and sexes were taken and carful history and examination was done, examination under microscope was done with carf
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreDiyala Governorate was recently exposed to high flood waves discharged from Hemrin Dam. Since the dam was at its full capacity during the flood period, these waves were discharged to the Diyala River. Because of the reduction in Diyala River capacity to 750m3/s, the cities and villages on both sides of the river banks were inundated. Thus, the study's objective is to design a flood escape out of the Diyala River, to discharge the flood wave through it. The flood escape simulation was done by using HEC- RAS software. Two hundred twenty-three cross sections for the escape and 30 cross-sections of the Diyala River were used as geometric data. Depending on the geological formation that the escape passed t
... Show MoreThe problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which
... Show More