In this study; the genus of Sinoxylon Duftschmid, 1825 (Coleoptera, Bostrichidae) was revised. There were 3 species registered in our investigations: S. anale Lesne, 1897; S. ceratoniae (Linnaeus, 1758) and S. muricatum (Olivier, 1790), the last species was redescribed as being found for the first time for the Iraqi faunal insects. Key to the species were constructed and supported by figures of the main diagnostic characters and some morphological features.
Nonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.
We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas
Soils encounter cyclic loading conditions in situ, for example during the earthquakes and in the construction sequences of pavements. Investigations on the local scale displacements of the soil grain and their failure patterns under the cyclic loading conditions are relatively scarce in the literature. In this study, the local displacement fields of a dense sand layer interacting with a rigid footing under the plane-strain condition are examined using both experiments and simulations. Three commonly used types of cyclic loading conditions were applied on the footing. Digital particle image velocimetry (DPIV) is used to measure the local scale displacement fields in the soil, and to understand the ev
(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world
... Show MoreTo ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show MoreIn the present study, cytogenetic and molecular techniques were conducted to detect the chromosomal aneuploidy and the involvement of N and H genes in squamous larynx carcinoma cell line Hep-2.Our results showed that numerical and structural abnormalities were involved in larynx cancer Hep-2.The total number of chromosomes ranging from tripolyploidy in passage187to more than that in passage207.The more frequent chromosomes involved in numerical aberrations were chromosomes1,7,16,17 and 18. Structural chromosomal aberrations were also detected.Deletion of short arm was detected in chromosome 1(del 1p) and the long arm of chromosome 1(del 1q)and 6(del 6q).Gaining on short arms were also recorded in chromosomes 3(3p+) and 12(12p+).At the mole
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreIn this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the met
... Show More