Preferred Language
Articles
/
hhdPH5MBVTCNdQwChsb_
Comparison between dome and wedge osteotomy in management of hallux valgus deformity
...Show More Authors

Background: the condition of hallux valgus is considered as the most common deformities affecting females more than males, characteristically manifested as lateral deviation of the big toe and widening of first and second inter -metatarsal angle with a deformity of second toe in some severe cases. Objective: to make a radiological and clinical assessment of two surgical methods of osteotomy used in treatment of hallux valgu and to compare between them: first one is the distal dome osteotomy, and second one is a distal wedge metatarsal osteotomy. Patients and methods: a total of 36 feet of 28 patients suffer from hallux valgus, with mean age of 50.3 years were included in this study, followed for 6- 30 months ( mean follow-up of 8.8 months). Nineteen feet treated by dome osteotomy and seventeen feet treated by wedge osteotomy. All the cases were evaluated by the american orthopedics foot and ankle society (aofas) score, also, through the hallux valgus angle and intermetatarsal angle, both before and after surgery. Results: by dome osteotomy, the preoperative mean result of aofas score was about 45.7, with hallux valgus angle (hva) of 33.2o and intermetatarsal angle (IMA) of 11.7º. Postoperatively, the mean result of AOFAS score was 82.8, with HVA of 14.3º and IMA of 7º, with about 94.7% satisfactory results. In the other hand, the method of wedge osteotomy showed a preoperative mean result for AOFAS score of 45.2, with HVA of 34º and IMA of 12.8º , compared with postoperative mean result of AOFAS score of about 80.7, with HVA of 15.8º and IMA of 7.7º, with about 82.8 % satisfactory results. Conclusions: the two methods of osteotomy were used with very good outcome in radiological and clinical treatment of hallux valgus. :

Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Estimates Nonparametric In Multiple Regression Analysis Function (Gamma ,Beta)
...Show More Authors

The use of non-parametric models and subsequent estimation methods requires that many of the initial conditions that must be met to represent those models of society under study are appropriate, prompting researchers to look for more flexible models, which are represented by non-parametric models                  

          In this study, the most important and most widespread estimations of the estimation of the nonlinear regression function were investigated using Nadaraya-Watson and Regression Local Ploynomial, which are one of the types of non-linear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (52)
Crossref (48)
Scopus Clarivate Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Simulation based comparison of routing protocols in wireless multihop adhoc networks
...Show More Authors

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz

... Show More
View Publication
Crossref (13)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Performance Comparison of Transport Layer Protocols
...Show More Authors

Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.

View Publication
Publication Date
Tue Mar 03 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
Current status of biomedical waste management in some universities in Baghdad and central public health of laboratories
...Show More Authors

The Current status of biomedical waste of solid, liquid and gaseous formulations from medical and educational laboratories in Iraqi universities and research centers was assessed using a well-structured questionnaire. The questionnaire was distributed to scientists, researchers, medical technicians and graduate students who are directly involved in laboratoiy daily activities. The responses were analyzed statistically and interpreted accordingly. The results showed diat the frequency of questionnaire respondent's affiliation gave the highest percentage frequency (69.4%) with the questionnaire of Technical Medical Institute/Al-Mansour while constitute die responses of the Dnig Control Department/Ministry of Sciences and Technology gave the l

... Show More
Scopus (1)
Scopus
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Importance of S-point in the Management of Severe Epistaxis
...Show More Authors

Although severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Us-china Public Administration
Victims of Terrorism between Compensation and Loss of Rights: A Comparative Study between Iraqi Law and French Law
...Show More Authors

The problem of the damage caused by terrorist acts has raised many difficulties in many countries, including Iraq, which requires the existence of a law that sets out sufficient rules for compensating the victims of terrorist acts, in order to compensate them for the harm they have not suffered. It may be difficult or impossible for them to identify causing damage, and therefore unable to obtain compensation by applying the traditional rules of liability that require proof of fault and identify the culprit. The security funds come as an appropriate alternative that pays compensation in such cases for victims to reparation for the damage they suffered. Therefore, this problem remains one of the most problems that Iraq suffers from it, which

... Show More
View Publication