Preferred Language
Articles
/
jkmc-399
Towards a Better Dacryocystorhinostomy, Evaluation of Multimodal Surgical Techniques in Nasolacrimal Duct Obstruction
...Show More Authors

Background: This study aimed to evaluate the outcome of long-term results of dacryocystorhinostomy (DCR) techniques in specialized eye care center in Iraq.

Subjects and Method: This is a prospective study of 650 patients from July 2014 to July 2019 with nasolacrimal duct obstruction in Ibn Al Haitham Eye Teaching Hospital. A preoperative questionnaire was done, then one month, three months, six months and one year postoperatively. The success of surgery defined as follow; Absence of epiphora completely, Resolve of dacryocele or mucocele or any new attack of daryocystitis, Appearance of fluorescein dye from nose in fluorescein disappearance test, Successful irrigation of nasolacrimal duct which is proofed endoscopically. The three types of surgery (External, Endoscopic and Transcanalicular Laser DCR) were discussed to the patient then preferred one is chosen. The results and complication were recorded.

Results: A total of 650 patients were included in this study, all were operated by same surgeon. The mean age of patients for external, endoscopic and Transcanalicular laser DCR (T-DCR) were 57, 44 and 51 years old respectively. The female patients were more than the male patients in all types of DCR surgeries and they represent 73.84% of total patients of external DCR (ext-DCR), 78.28% in endoscopic DCR (endo-DCR) and 55.15% in TCL-DCR. A satisfied patient to outcome according to surgery type was 91.20% with ext-DCR, 88.70% with endo-DCR and 51% with TCL-DCR.

Conclusion: The most satisfied techniques to patients with higher success rate are the ext-DCR and endo-DCR while the TCL-DCR is still evolving with limit indications and lower success rate.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Formation Evaluation for Nasiriyah Oil Field Based on The Non-Conventional Techniques
...Show More Authors

The unconventional techniques called “the quick look techniques”, have been developed to present well log data calculations, so that they may be scanned easily to identify the zones that warrant a more detailed analysis, these techniques have been generated by service companies at the well site which are among the useful, they provide the elements of information needed for making decisions quickly when time is of essence. The techniques used in this paper are:

  • Apparent resistivity Rwa
  • Rxo /Rt

   The above two methods had been used to evaluate Nasiriyah oil field formations (well-NS-3) to discover the hydrocarbon bearing formations. A compu

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Towards a new global leadership to combat international terrorism
...Show More Authors

In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Evaluation of Sustainable Spatial Suitability of Urban and Population Expansion in Al Hillah City Using Remote Sensing Techniques
...Show More Authors
Abstract<p>The study focused on explaining urban expansion and sustainable development of urban land and explaining the role of population expansion in Al Hillah city, Al Hillah city in the center of Babylion Governorate located. The study relied on analyzing the population data of the city of Al Hillah for a period of time (22 years) for the period (2000-2022). This data was analyzed and its role in planning and designing residential areas and neighborhoods in the Al Hillah city was analyzed based on the standards of urban planning and sustainable growth of cities. Landsat 5TM was used in the investigation, Landsat 8OLI satellite data to retrieve the NDVI, NDBI, and NDWI. The findings showed th</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative evaluation of the radiographic density of GuttaFlow® 2 in different obturation techniques using Spiral Computed Tomography
...Show More Authors

Background: Ideal root canal obturation depends on many factors; one of them is good sealing of root canal without pores. The aim of this study was to determine the radiographic density of GuttaFlow® 2 with different obturation techniques using spiral computed tomography. Materials and Methods: Forty palatal roots of permanent maxillary first molar were used in this study. Following working length determination, root canal was prepared using rotary PROTAPER universal system. They were randomly divided into four groups of 10 roots each, the groups are Conventional lateral condensation with Apexit Plus sealer, Conventional lateral condensation with GuttaFlow® 2 as a sealer, Soft Core Regular with GuttaFlow® 2 as a sealer and singl

... Show More
View Publication
Crossref
Publication Date
Thu Jan 23 2020
Journal Name
Iraqi Journal Of Laser
Assisted Non-Surgical Therapy of Periodontal Pockets Utilizing Diode Laser: A Randomized Clinical Trial
...Show More Authors

Periodontal diseases are inflammatory diseases, for which, scaling and root planning is the main approach. Diode laser therapy as an adjunct to non-surgical periodontal treatment has shown some beneficial effects.

Aim: The objective of this single randomized controlled clinical study was to assess the effect of a 940 nm diode laser as an adjunct to SRP therapy in the treatment of periodontal pockets.

 Methods: In this study, twenty patients in need of periodontal treatment with periodontal pocket ≥ 4 mm were selected for this split-mouth clinical study. Test group treated by diode laser 940 nm as an adjunct with SRP, control group treated by SRP in contralateral quadrants. Clinical

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
View Publication Preview PDF
Scopus (99)
Crossref (91)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study of Forced- Convection from Horizontal Rectangular Fins Array into Air Duct
...Show More Authors

    In this work, an experimental study has been done to expect the heat characteristics and performance of the forced-convection from a heated horizontal rectangular fins array to air inside a rectangular cross-section duct. Three several configurations of rectangular fins array have been employed. One configuration without notches and perforations (solid) and two configurations with combination of rectangular-notches and circular-perforations for two various area removal percentages from fins namely 18% notches-9% perforations and 9% notches-18% perforations are utilized.  The rectangular fins dimensions and fins number are kept constant. The fins array is heated electrically from the base

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
A Stylistic Study of Cohesion in Relation to Narrative Techniques in Religious Discourse
...Show More Authors

Cohesion is well known as the study of the relationships, whether grammatical and/or lexical, between the different elements of a particular text by the use of what are commonly called 'cohesive devices'. These devices bring connectivity and bind a text together. Besides, the nature and the amount of such cohesive devices usually affect the understanding of that text in the sense of making it easier to comprehend.  The present study is intendedto examine the use of grammatical cohesive devicesin relation to narrative techniques. The story of Joseph from the Holy Quran has been selected to be examined by using Halliday and Hasan's Model of Cohesion (1976, 1989). The aim of the study is to comparatively examine to what extent the type

... Show More
View Publication Preview PDF
Publication Date
Sat May 29 2021
Journal Name
Journal Of Legal And Political Thought
The extent of the possibility of compensating for the obstruction of the view (vision) as a result of the establishment of public projects - a legal study in light of the position of the American courts
...Show More Authors

Despite the great economic and commercial importance given to real estate by virtue of its view of the landscape or public roads, US courts have differed in their position on compensation for damages resulting from blocking that view or vision by public projects. Some courts compensated for such damages, other courts approved such compensation. Hence, this research came to shed light on the extent of the possibility of compensation for blocking the view or vision as a result of public projects, and the research has supported us with many judicial decisions.

View Publication