Background: Shunt operations are performed for different reasons mainly hydrocephalus congenital or acquired. It’s associated with certain morbidity and mortality.
Patients and method: A prospective study from Jan 2004 to Jan 2006, 226 patients under went shunt operation in the specialized surgical hospital in Baghdad. The patients were divided into two groups according to the way of applying the upper end catheter. In group A49 patients where posterior parietal approach was used, and group (B) 174 where parietal or temproprietal approach was used.
Results and discussions: different complications were recorded, but the most frequent was upper end obstruction by choroids plexus or by debris. In group (A) only one patient 2% while in group (B) 27 patients 15.5% this wide difference in incidence of this complication, clears the significance of posterior parietal approach as a method of choice in applying ventricular catheter. Other complications were recorded as infection, lower end obstruction of others. A low rate of mortality recorded and discussed thoroughly.
Conclusion: Choosing the post parietal type with prophylactic antibiotics carries the best results.
Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Public utilities are the most important institutions at the present time, because of their great importance in providing daily services to citizens to meet their needs, and thus help the state to develop and progress in various social, economic and even security fields, and they also have a major role in creating an environment filled with stability and good life.
Due to the great importance of public utilities, the hand of the legislator extended to protecting and regulating them in many legal texts, so he singled out many texts for them, whether in regulatory or even penal laws, and because penal texts are the most important legal texts because of their great role in protection, as well as their connection to the rights and fre
... Show MoreThe huge amount of documents in the internet led to the rapid need of text classification (TC). TC is used to organize these text documents. In this research paper, a new model is based on Extreme Machine learning (EML) is used. The proposed model consists of many phases including: preprocessing, feature extraction, Multiple Linear Regression (MLR) and ELM. The basic idea of the proposed model is built upon the calculation of feature weights by using MLR. These feature weights with the extracted features introduced as an input to the ELM that produced weighted Extreme Learning Machine (WELM). The results showed a great competence of the proposed WELM compared to the ELM.
In this work we fabrication holographic optical element diffraction grating thickness 40?m and mirror90?m by using dichromated gelatin,to perform that we have to use the Nd-yaG laser doubling frequency of wavelenght (532)nm and its powers of (80)mWatt.we have studyed the thickness and concentration dichromat effect in mirror reflaction ,effect of angle of reconstruction beam in band width and diffraction efficiency ,study effect gelatin hardener of the diffraction efficiency.
In this paper an authentication based finger print biometric system is proposed with personal identity information of name and birthday. A generation of National Identification Number (NIDN) is proposed in merging of finger print features and the personal identity information to generate the Quick Response code (QR) image that used in access system. In this paper two approaches are dependent, traditional authentication and strong identification with QR and NIDN information. The system shows accuracy of 96.153% with threshold value of 50. The accuracy reaches to 100% when the threshold value goes under 50.
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
Givers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show More