The purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the incidence of trauma to other body regions and the presence of retained foreign bodies. The effect on the mandible of IED explosion resembles that of bullets. Bullet injuries are associated with a relatively higher number of mandibular sites involved and more bilateral fractures, in addition to more extensive bone loss. IEDs, on the other hand, cause more multisystem injuries and result in more retained foreign bodies.
In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show MoreThe study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show MoreThis is an empirical investigation of the tribal power in Iraq and its consequences on the socio-political system. A theoretical background concerning thestate kinship, tribe and tribal involvement in politics has been displayed with example of tribal power over people within the social context. Socio-anthropological method of data collection has been used, including a semi-structured interview with a sample of 120 correspondents. The outcome revealed that the feeble and corrupted state (government) play a vital role in encouraging the tribe to be dominant. The people of Iraq are clinging to the tribe regardless of whether they believe in it or not. Although they are aware that the tribe is a pre-state organisation and marred shape of ci
... Show MoreThe world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.
The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Developing a solid e-voting system that offers fairness and privacy for users is a challenging objective. This paper is trying to address whether blockchain can be used to build an efficient e-voting system, also, this research has specified four blockchain technologies with their features and limitations. Many papers have been reviewed in a study covered ten years from 2011 to 2020. As a result of the study, the blockchain platform can be a successful public ledger to implement an e-voting system. Four blockchain technologies have been noticed from this study. These are blockchain using smart contracts, blockchain relying on Zcash platform, blockchain programmed from scratch, and blockchain depending on digital signature. Each bl
... Show MoreBackground: Changes of coagulation profile have been described in patients with B-Thalassemia major. Prolongation of prothrombin time and partial thromboplastin time and reduced levels of coagulation factors and natural anticoagulants have been variously described though the mechanisms involved in the thrombotic tendency seen in some Thalassemia patients have not been fully clarified.
Objectives: To investigate changes in the coagulation profile in patients with B-Thalassemia according to the available hemostatic parameters in Thalassemia patients in Al-Karama Teaching Hospital in Wasit governorate.
Methods: Hemostatic variables were studied in pre-transfusion blood samples from 50 transfusion-dependent children with Beta Thalassem
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam
... Show More