Preferred Language
Articles
/
yhf-fI4BVTCNdQwCLkoQ
Excellent recovery after nonmissile penetrating traumatic brain injury in a child: A case report
...Show More Authors
Background:

Nonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.

Case Description:

We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull base zone.

Conclusion:

We demonstrated that following standard recommendations in the management of pTBI which include applying the advanced trauma life support protocol in ER, acquiring the needed preoperative neuroimaging studies, avoiding moving the penetrating object till patient shifted to OR, and finally performing a planned stepwise surgical intervention through craniotomy may yield an excellent functional recovery, especially in children despite an otherwise grave initial presentation and apparently profound brain injury.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
A reliable numerical simulation technique for solving COVID-19 model
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
The Peristaltic Flow of Jeffrey Fluid through a Flexible Channel
...Show More Authors

    The purpose of this study is to calculate the effect of the elastic wall of a hollow channel of Jeffrey's fluid by peristaltic flow through two concentric cylinders. The inside tube is cylindrical and the outside is a regular elastic wall in the shape of a sine wave. Using the cylindrical coordinates and assuming a very short wavelength relative to the width of the channel to its length and using governing equations for Jeffrey’s fluid in Navier-Stokes equations, the results of the problem are obtained. Through the Mathematica  program these results are  analysed.

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
A Random Laser Production Using Fluorescein Dye Doped TiO2 Nanoparticles
...Show More Authors

A random laser has been produced using Fluorescein dye solution in water, with concentration of (8 10-5 M); doped with (0.001g) TiO2 Nanoparticles with the particle size of (15.7 nm). A blue diode laser of 450 nm wavelength has been used as an optical pumping source. The wavelength of the random laser was 523 nm and the intensity was 5.44 mW

View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 26 2022
Journal Name
Iraqi Journal Of Science
A Comprehensive Study and Analysis of the Chaotic Chua Circuit
...Show More Authors

      was studied by taking several different values for the constant α and fixing the other three variables β, c and d with the values 25.58, -0.7142857, and -1.142, respectively. The purpose of this paper is to know the values by which the system transforms from a steady state to a chaotic state under the initial conditions x, y, and z that equal -1.6, 0 and 1.6 respectively. It was found that when the value of α is equal to 0, the Chua system is in a steady state, and when the value of α is equal to 9.5 and the wave is sinusoidal, the system is in oscillation, and when α is equal 13.4 the system is in a Quasi-chaotic state, and finally the system turns to the chaotic state when the value of α equals 15.0

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Historical Value of Dickens’s A Tale of Two Cities
...Show More Authors

In "historical" fiction, characters that never really existed, give expression to the impact of historical events on the people who really did live through them. The result is not history, as an accurate record of actual events, but fiction in which an earlier age is rendered through the personal joys and sufferings of characters. This paper
aims at investigating the historical realities presented in Dickens’s A Tale of Two Cities.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design an Integral Sliding Mode Controller for a Nonlinear System
...Show More Authors

The goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Publication Date
Tue Jan 09 2024
Journal Name
مجلة واسط للعلوم الریاضیة
The development of judo from a historical perspective (1880-1980)
...Show More Authors

Judo has witnessed tremendous developments since its inception until the present day. It has been distinguished by its adaptation to the various challenges it has faced throughout the ages. Judo is one of the sports that have been affected by social, technological and cultural changes. These changes reflect its transformation from the traditional Japanese martial art to a global sport practiced. All over the world, therefore, studying the historical development of judo is important, as it provides valuable insights into the development of martial arts over a century, by studying the origins, principles and techniques of judo for the period (1880 - 1980), and also enables us to gain an understanding A deeper understanding of how the art form

... Show More
View Publication