BACKGROUND: Femoral shaft fracture is a common fracture in pediatric age group reaching 62% of all fracture shaft femur in children in spite of rapid union rate and successful conservative treatment but some cases need surgical intervention and one of the methods using plate and screw by the lateral approach. AIM: This study aims to compare functional outcome fixation of mid-shaft femur fracture in children by plate and screws between (subvastus lateralis and transvastus lateralis) regarding infection, union, and limitation of knee movement. PATIENT AND METHOD: The study was done on 30 children who had diaphyseal fracture femur in Al-Kindy Teaching Hospital in period (April 2018–April 2020) with 6 months follow-up, and the patient was divided into two groups: Group A first treated by subvastus lateral approach 15 patients and the second group, Group B by transvastus lateral approach 15 patients and follow-up done for them after 2 weeks, 4 weeks, 6 weeks, 3 months, and 6 months. RESULTS: At week 16 of follow-up all patients in Group A had union, while in Group B, 14 of 50 patients had union and one patient had no union and one patient in Group B had an infection when compared to Group A. From 15 patients of Group A, two patients had limitation of knee movement in the 1st month of follow-up then in the 3rd month of follow-up, no patient had limitation of knee joint movement, while five patients had limitation of knee joint movement in Group B in the 1st month of follow-up and one patient had limitation knee joint movement in the 3rd month of follow-up. CONCLUSIONS: The subvastus lateralis approach results better than transvastus lateralis in union.
In recent years, the need for Machine Translation (MT) has grown, especially for translating legal contracts between languages like Arabic and English. This study primarily investigates whether Google Translator can adequately replace human translation for legal documents. Utilizing a widely popular free web-based tool, Google Translate, the research method involved translating six segments from various legal contracts into Arabic and assessing the translations for lexical and syntactic accuracy. The findings show that although Google Translate can quickly produce English-Arabic translations, it falls short compared to professional translators, especially with complex legal terms and syntax. Errors can be categorized into: polysemy,
... Show MoreIn this study, investigations of structural properties of n-type porous silicon prepared by laser assisted-electrochemical etching were demonstrated. The Photo- electrochemical Etching technique, (PEC) was used to produce porous silicon for n-type with orientation of (111). X-ray diffraction studies showed distinct variations between the fresh silicon surface and the synthesized porous silicon surfaces. Atomic force microscopy (AFM) analysis was used to study the morphology of porous silicon layer. AFM results showed that root mean square (RMS) of roughness and the grain size of porous silicon decreased as etching current density increased. The chemical bonding and structure were investigated by using fourier transformation infrared spec
... Show MoreBackground Anorectal carcinoma includes the anal margin, the anal canal, and the lower rectum. The incidences of anal tumors represent 1.4 % of all gastrointestinal tumors.
Patients and methods Our study is retrospective and was conducted at Baghdad Medical City. Patient’s data were collected from the medical records through a predesigned sheet that included the following information: demographic data, medical history, past-history, presenting symptoms, pathological data, and treatment details.
Results The median age was 49 years. As regard tumor extension, 85.71 % of patients had anal disease, while anorectal cancer was encount
Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreHoneywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreIn recent years, with the rapid development of the current classification system in digital content identification, automatic classification of images has become the most challenging task in the field of computer vision. As can be seen, vision is quite challenging for a system to automatically understand and analyze images, as compared to the vision of humans. Some research papers have been done to address the issue in the low-level current classification system, but the output was restricted only to basic image features. However, similarly, the approaches fail to accurately classify images. For the results expected in this field, such as computer vision, this study proposes a deep learning approach that utilizes a deep learning algorithm.
... Show MoreFractal image compression depends on representing an image using affine transformations. The main concern for researches in the discipline of fractal image compression (FIC) algorithm is to decrease encoding time needed to compress image data. The basic technique is that each portion of the image is similar to other portions of the same image. In this process, there are many models that were developed. The presence of fractals was initially noticed and handled using Iterated Function System (IFS); that is used for encoding images. In this paper, a review of fractal image compression is discussed with its variants along with other techniques. A summarized review of contributions is achieved to determine the fulfillment of fractal ima
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More