Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- sectional study.Methods: Data taken from 114 patients with DVT were analyzed by association rules mining.Immobility was the most important risk factor. Results: Smoking add more risk to immobile, post operative patient. Age per se has no effect.100% of patients with long bone fracture, were immobile. Fever occurred in one third of post operative patients who develop DVT. Conclusions: Association rules mining allow better and faster analysis of more data with an interactive powerful system, which saves time and effort, and discovers the relations among many factors to one or more than one factors. So, we use this method for analysis in this study, and we get the above mentioned relations, which are important for the future management of DVT.
The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreThese deposits take many forms like current acc, deposits in order to growth and serve national economy Various in varicose perspectives .
The problem of this paper its concern with un applied the mathematical models that used in profitability analysis of current acc , and deposits in view of risk, profit efficiency and financial leverage for this reason the paper discussion use the cumulate mathematical model to solve these problem, that content three variables that be used to measuring profitability by consequent replacement method by stable base and by moving base for 2007 – 2009 applied the data collect from Iraq middle east bank. &nbs
... Show MoreThe study aimed to reveal the level to which the international issues are integrated into the books of Saudi public education social studies and citizenship in the light of the principles of international education, and to know the level of continuity and integration of these issues in the books, to build a range and sequence matrix of international issues through it. The study followed the descriptive and analytical method that used the content analysis card as a tool for study when the tool achieved the necessary validity and reliability characteristics. The data of this study has been processed using the SPSS statistical program according to a set of appropriate methods of descriptive and inferential statistics.
The resu
... Show MoreAbstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.
The Al-Kindy College Medical Journal (KCMJ) is an Iraqi scholarly journal published by the Al-Kindy College of Medicine, University of Baghdad. It was officially founded in 2004. It is a peer-reviewed journal, published in both online and printed forms. It has a mission to offer a publication platform that mirrors recent knowledge and findings in the field of medicine and medical sciences. It publishes various types of articles, including editorial, review article, research article, brief report, case report, and letter to editor. It accepts articles in the English language. It was biannually published till 2021 when it started to launch three issues per year. The journal is registered with numerous partners, including Iraqi Academi
... Show MoreThe charge density distributions (CDD) and the elastic electron
scattering form factors F(q) of the ground state for some even mass
nuclei in the 2s 1d shell ( Ne Mg Si 20 24 28 , , and S 32 ) nuclei have
been calculated based on the use of occupation numbers of the states
and the single particle wave functions of the harmonic oscillator
potential with size parameters chosen to reproduce the observed root
mean square charge radii for all considered nuclei. It is found that
introducing additional parameters, namely 1 , and , 2 which
reflect the difference of the occupation numbers of the states from
the prediction of the simple shell model leads to a remarkable
agreement between the calculated an
OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MoreThis study aimed to reveal the extent to which the values of social peace are included in the content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia. To achieve this goal, the researcher used the descriptive analytical approach. The study sample consisted of all developed social and national studies textbooks of the middle stage in kingdom of Saudi Arabia in first and second semester of student books in edition of 1439-1440. The study tool was the analysis card. The study reached the following results: 1-The content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia as a whole included (38) social peace values of total (40) values, corresponding to the inclusio
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of how the
... Show More