The interesting new sources of data for official statistics are cell phone data. Electronic media has defined the way of research human behavior rapidly over the last decade. As data storage and sensing technology progressed, electronic records now cover a diverse variety of human activities from localized data (phone) to open source contributions on Wikipedia and the Open Area Map. Electronic records now encompass the numerous fields of activity. The ad hoc vehicle network is a research community-based wireless technology for the implementation of intelligent transport applications. It is necessary to estimate migration flows and predict future trends to understand the causes and effects of migration and to enforce policies t
... Show MoreThis paper aims to make a historical review of jet grouting techniques and encountered problems at different sites in several countries. This review is a good guide to understanding the performance and limitations of improved soils or lands. The basic concept of jet grouting technology is to use cement as a binder to accelerate the hardening process of an admixture of material grout and soil. The different case history was conducted in both sand soil and clay soil in the horizontal and vertical direction. Other papers on field construction showed that the grout can be gelled within 5-10 minutes. Due to different cases and studies, these will help improve soil by supporting the foundation load with a minimal settlement.
... Show MorePresent investigation aimed to study plasma BNP hormone estimation as predictor of brain stroke and neurocognitive in relative with other limitations in CKD patient. The case control experimental study was conducted on CKD patient at Yarmuk Hospital at Baghdad Province, Iraq from February to April 2020. The results showed that there were significant variances (P< 0.05) between CKD patients and control group, there was significant increase in BNP hormone and cystatin-C levels at patient, while ihematological parameters were significantly decreased. The parameters of lipid profile were significantly increased (P<0.05). The result revealed that there was relationship between BNP hormone level and CKD. This support that BNP level is related wit
... Show MoreBackground: Numerous methods have been described for achievement of Intermaxillary fixation in the treatment of fractures of facial skeleton. Conventional methods like Erich arch bars and eyelet wires are currently the most common methods for achieving intermaxillary fixation (IMF), however, they have their own disadvantages. Since 1989, IMF using intraoral self-tapping IMF screws has been introduced for treatment of mandibular fractures. The aim of this study was to evaluate the efficacy, advantages, disadvantages and potential complications associated with using of self-tapping IMF screws in the treatment of mandibular fractures. Material and Methods: Twenty patients with favorable mandibular fractures, attended to Oral and Maxillofacial
... Show MoreThe banking system considered as one of the most important intermediate circle between creditor and debtors it is mean the most important funding rings in economic activity, whether finance takes the a consumer or investment form and therefore it is the main base to stimulate economic activity both on the demand side, both consumption and investment and therefore of the main motivating factors for economic growth.
The banking system depends in achieve its goals on the grants and loan recovery, or what is known credit process and according to what the importance referred to the role of the banking system, it is important to ensure the safety and efficiency of the mechanisms of banking device and safety is
... Show MoreHerpes labialis is an infection caused by the herpes simplex virus, characterized by an eruption of small and usually painful blisters on the skin of the lips, mouth, gums, or the skin around the mouth. Although there is no successful treatment available, the local use of compounds with effective anti-inflammatory and cytoprotective effects may be of value in this respect. This project was designed to evaluate clinically the local use of silymarin, a group of flavonoids with powerful antioxidant, anti-inflammatory and cytoprotective activity, in the treatment of herpes simplex ulcer. Fifty three patients with herpes labialis ulcers (HLU) were enrolled in this randomized, single blinded, placebo controlled clinical study, and they were al
... Show MoreBackground: Patients who have both neurological impairment and kyphotic deformity can be treated medically, and this treatment can be achieved with anti-tuberculous drugs alone.
Objective: To evaluate conservative medical management of patients with tuberculosis of the spine (Pott disease). The prognostic significance of various clinical, radiological, and long-term follow-up findings in these patients was also evaluated.
Methods: Between January 2009 and January 2018 data were collected prospectively at The Neurosciences Hospital/ Baghdad/ Iraq in 44 patients with Pott disease in the thoracic and lumbar spine. These patients had no major neurological deficits or
... Show MoreBackground: Trigeminal neuralgia (TN), or Tic Douloureux, is one of the most common neuropathic pains. Gamma knife stereotactic radiosurgery (GNSRS) has been considered one of the procedures for treating primary TN. Objective: This study evaluates the effectiveness of GNSRS in treating primary TN in patients who are unresponsive to medical treatment in a single-center experience. Subjects and Methods: This study was conducted on 180 patients from January 2018 to October 2021. The study utilized the Barrow Neurological Institute (BNI) pain intensity score to assess pain before and after GNSRS treatment. Results: A total of 180 patients with primary TN were included in this study, 108 female with a 1.5:1 female: male ratio. Results
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.