Background: the condition of hallux valgus is considered as the most common deformities affecting females more than males, characteristically manifested as lateral deviation of the big toe and widening of first and second inter -metatarsal angle with a deformity of second toe in some severe cases. Objective: to make a radiological and clinical assessment of two surgical methods of osteotomy used in treatment of hallux valgu and to compare between them: first one is the distal dome osteotomy, and second one is a distal wedge metatarsal osteotomy. Patients and methods: a total of 36 feet of 28 patients suffer from hallux valgus, with mean age of 50.3 years were included in this study, followed for 6- 30 months ( mean follow-up of 8.8 months). Nineteen feet treated by dome osteotomy and seventeen feet treated by wedge osteotomy. All the cases were evaluated by the american orthopedics foot and ankle society (aofas) score, also, through the hallux valgus angle and intermetatarsal angle, both before and after surgery. Results: by dome osteotomy, the preoperative mean result of aofas score was about 45.7, with hallux valgus angle (hva) of 33.2o and intermetatarsal angle (IMA) of 11.7º. Postoperatively, the mean result of AOFAS score was 82.8, with HVA of 14.3º and IMA of 7º, with about 94.7% satisfactory results. In the other hand, the method of wedge osteotomy showed a preoperative mean result for AOFAS score of 45.2, with HVA of 34º and IMA of 12.8º , compared with postoperative mean result of AOFAS score of about 80.7, with HVA of 15.8º and IMA of 7.7º, with about 82.8 % satisfactory results. Conclusions: the two methods of osteotomy were used with very good outcome in radiological and clinical treatment of hallux valgus. :
The use of non-parametric models and subsequent estimation methods requires that many of the initial conditions that must be met to represent those models of society under study are appropriate, prompting researchers to look for more flexible models, which are represented by non-parametric models
In this study, the most important and most widespread estimations of the estimation of the nonlinear regression function were investigated using Nadaraya-Watson and Regression Local Ploynomial, which are one of the types of non-linear
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreRouting protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreThrough recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
The Current status of biomedical waste of solid, liquid and gaseous formulations from medical and educational laboratories in Iraqi universities and research centers was assessed using a well-structured questionnaire. The questionnaire was distributed to scientists, researchers, medical technicians and graduate students who are directly involved in laboratoiy daily activities. The responses were analyzed statistically and interpreted accordingly. The results showed diat the frequency of questionnaire respondent's affiliation gave the highest percentage frequency (69.4%) with the questionnaire of Technical Medical Institute/Al-Mansour while constitute die responses of the Dnig Control Department/Ministry of Sciences and Technology gave the l
... Show MoreAlthough severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.
The problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which
... Show More