BACKGROUND: Femoral shaft fracture is a common fracture in pediatric age group reaching 62% of all fracture shaft femur in children in spite of rapid union rate and successful conservative treatment but some cases need surgical intervention and one of the methods using plate and screw by the lateral approach. AIM: This study aims to compare functional outcome fixation of mid-shaft femur fracture in children by plate and screws between (subvastus lateralis and transvastus lateralis) regarding infection, union, and limitation of knee movement. PATIENT AND METHOD: The study was done on 30 children who had diaphyseal fracture femur in Al-Kindy Teaching Hospital in period (April 2018–April 2020) with 6 months follow-up, and the patient was divided into two groups: Group A first treated by subvastus lateral approach 15 patients and the second group, Group B by transvastus lateral approach 15 patients and follow-up done for them after 2 weeks, 4 weeks, 6 weeks, 3 months, and 6 months. RESULTS: At week 16 of follow-up all patients in Group A had union, while in Group B, 14 of 50 patients had union and one patient had no union and one patient in Group B had an infection when compared to Group A. From 15 patients of Group A, two patients had limitation of knee movement in the 1st month of follow-up then in the 3rd month of follow-up, no patient had limitation of knee joint movement, while five patients had limitation of knee joint movement in Group B in the 1st month of follow-up and one patient had limitation knee joint movement in the 3rd month of follow-up. CONCLUSIONS: The subvastus lateralis approach results better than transvastus lateralis in union.
The need for detection and investigation of the causes of pollution of the marshes and submit a statistical study evaluated accurately and submitted to the competent authorities and to achieve this goal was used to analyze the factorial analysis and then obtained the results from this analysis from a sample selected from marsh water pollutants which they were: (Electrical Conductivity: EC, Power of Hydrogen: PH, Temperature: T, Turbidity: TU, Total Dissolved Solids: TDS, Dissolved Oxygen: DO). The size of sample (44) sites has been withdrawn and examined in the laboratories of the Iraqi Ministry of Environment. By illustrating SPSS program) the results had been obtained. The most important recommendation was to increase the pumping of addit
... Show MoreThe present study is a hybrid method of studying the effect of plasma on the living tissue by using the image processing technique. This research explains the effect of microwave plasma on the DNA cell using the comet score application, texture analysis image processing and the effect of microwave plasma on the liver using texture analysis image processing. The study was applied on the mice cells. The exposure to the plasma is done by dividing the mice for four groups, each group includes four mice (control group, 20, 50, 90 second exposure to microwave plasma). The exposure to microwave plasma was done with voltage 175v and gas flow on 2 with room temperature; the statistical features are obtained from the comet score images and the textur
... Show MoreThe electric quadrupole moments for some scandium isotopes (41, 43, 44, 45, 46, 47Sc) have been calculated using the shell model in the proton-neutron formalism. Excitations out of major shell model space were taken into account through a microscopic theory which is called core polarization effectives. The set of effective charges adopted in the theoretical calculations emerging about the core polarization effect. NushellX@MSU code was used to calculate one body density matrix (OBDM). The simple harmonic oscillator potential has been used to generate the single particle matrix elements. Our theoretical calculations for the quadrupole moments used the two types of effective interactions to obtain the best interaction compared with the exp
... Show MoreThe problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni
... Show MoreData mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More