Preferred Language
Articles
/
yhf-fI4BVTCNdQwCLkoQ
Excellent recovery after nonmissile penetrating traumatic brain injury in a child: A case report
...Show More Authors
Background:

Nonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.

Case Description:

We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull base zone.

Conclusion:

We demonstrated that following standard recommendations in the management of pTBI which include applying the advanced trauma life support protocol in ER, acquiring the needed preoperative neuroimaging studies, avoiding moving the penetrating object till patient shifted to OR, and finally performing a planned stepwise surgical intervention through craniotomy may yield an excellent functional recovery, especially in children despite an otherwise grave initial presentation and apparently profound brain injury.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
A Light Weight Multi-Objective Task Offloading Optimization for Vehicular Fog Computing
...Show More Authors

Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Crossref
Publication Date
Wed May 10 2023
Journal Name
Diagnostics
A Deep Feature Fusion of Improved Suspected Keratoconus Detection with Deep Learning
...Show More Authors

Detection of early clinical keratoconus (KCN) is a challenging task, even for expert clinicians. In this study, we propose a deep learning (DL) model to address this challenge. We first used Xception and InceptionResNetV2 DL architectures to extract features from three different corneal maps collected from 1371 eyes examined in an eye clinic in Egypt. We then fused features using Xception and InceptionResNetV2 to detect subclinical forms of KCN more accurately and robustly. We obtained an area under the receiver operating characteristic curves (AUC) of 0.99 and an accuracy range of 97–100% to distinguish normal eyes from eyes with subclinical and established KCN. We further validated the model based on an independent dataset with

... Show More
View Publication
Scopus (27)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Crossref
Publication Date
Fri Mar 15 2024
Journal Name
Iraqi Statisticians Journal
Estimate a nonparametric copula density function based on probit and wavelet transforms
...Show More Authors

This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log

... Show More
View Publication
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel improvement of skew tent map for generating Pseudo random numbers
...Show More Authors

An encryption system needs unpredictability and randomness property to maintain information security during transmission and storage. Although chaotic maps have this property, they have limitations such as low Lyapunov exponents, low sensitivity and limited chaotic regions. The paper presents a new improved skewed tent map to address these problems. The improved skew tent map (ISTM) increases the sensitivity to initial conditions and control parameters. It has uniform distribution of output sequences. The programs for ISTM chaotic behavior were implemented in MATLAB R2023b. The novel ISTM produces a binary sequence, with high degree of complexity and good randomness properties. The performance of the ISTM generator shows effective s

... Show More
View Publication
Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
A Study of Crystallographic and DC Electrical Characteristics of PPy/Ag Nanocomposites
...Show More Authors

ABSTRACT: Polypyrrole and polypyrrole / silver nanocomposites were fabricated by in-situ polymerization employing Ammonium Persulphate as an oxidizing agent. Nanocomposites were synthesized by combining polypyrrole and silver nanoparticles in various weight percentages (0.1%, 0.5%, 3%, 5% and 7% wt.). Crystallographic data were collected using X-ray diffraction.  PPy particles were found to have an orthorhombic symmetry. In contrast, PPy/Ag nanocomposites were reported to have monoclinic structure. The crystallite size was determined by XRD using Scherrer equation and considered to be within 49 nm range. DC conductivity of pelletized samples was evaluated in the temperature range of 323.15k to 453.15k. The conductivity displayed an

... Show More
Crossref (1)
Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Bioorganic Chemistry
A new class of cytotoxic agents targets tubulin and disrupts microtubule dynamics
...Show More Authors

View Publication
Scopus (20)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Sep 29 2024
Journal Name
Pakistan Journal Of Criminology
Artificial Intelligence and Violation of International Human Rights Law: A Dialectical Relationship
...Show More Authors

The study explored applications of artificial intelligence and its dialectical relationship with international human rights law of individuals, which requires assessing the effects of this technology on human rights and freedoms. The problem of privacy of humanity, as AI technologies can control human rights and freedoms, while monitoring potential violations in this context. The study use of documentary research and qualitative lens to analyze the data. In conclusion, unawareness of the use of AI may impose significant hurdles on future generations and may infringe on human rights across all sectors of society. The government should mandate obligations for artificial intelligence businesses concerning education, health, human right

... Show More
View Publication
Publication Date
Sun Jul 08 2018
Journal Name
Journal Of Global Pharma Technology
Association of Insulin-Like Growth Factor 2 Apa 1 A820G (rs680) Polymorphism with Thyroid Dysfunction in a Sample Iraqi Patien
...Show More Authors

Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A Study of the Nutritional Behavior and Body Mass Indexes for Students of Age (17-25) Years In Baghdad, Iraq.
...Show More Authors

The aim of this study was to assess the nutritional status for samples at the age of 17-15 years. These samples were taken from secondary schools and universities in Baghdad area, 123 of them were male and 261 were female. Data on weight, height and body mass index (BMI) were determined in each individual. Smaller sample of 215 individuals (male and female) from the original sample was taken in order to record their nutritional behavior and daily food intake during the 24 hours prior to the visit through personal meeting using special questionnaire. The results showed that the weight and the height were within the range of the people of neighboring Arab countries, who are in the same age. Beside 44.4- 55.95% of these samples were within t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref