BACKGROUND: Femoral shaft fracture is a common fracture in pediatric age group reaching 62% of all fracture shaft femur in children in spite of rapid union rate and successful conservative treatment but some cases need surgical intervention and one of the methods using plate and screw by the lateral approach. AIM: This study aims to compare functional outcome fixation of mid-shaft femur fracture in children by plate and screws between (subvastus lateralis and transvastus lateralis) regarding infection, union, and limitation of knee movement. PATIENT AND METHOD: The study was done on 30 children who had diaphyseal fracture femur in Al-Kindy Teaching Hospital in period (April 2018–April 2020) with 6 months follow-up, and the patient was divided into two groups: Group A first treated by subvastus lateral approach 15 patients and the second group, Group B by transvastus lateral approach 15 patients and follow-up done for them after 2 weeks, 4 weeks, 6 weeks, 3 months, and 6 months. RESULTS: At week 16 of follow-up all patients in Group A had union, while in Group B, 14 of 50 patients had union and one patient had no union and one patient in Group B had an infection when compared to Group A. From 15 patients of Group A, two patients had limitation of knee movement in the 1st month of follow-up then in the 3rd month of follow-up, no patient had limitation of knee joint movement, while five patients had limitation of knee joint movement in Group B in the 1st month of follow-up and one patient had limitation knee joint movement in the 3rd month of follow-up. CONCLUSIONS: The subvastus lateralis approach results better than transvastus lateralis in union.
Objective(s): To assess women’s knowledge about health promotion after a cesarean delivery and to determine the association between women’s knowledge and their demographic data of age, level of education, and monthly income. Methodology: A descriptive design is carried out to assess women’s knowledge about health promotion after cesarean delivery at Maternity and Pediatric Hospital in Al-Samawa City. This study starts from 26th of September 2020 up to 16th March 2021. Sample of (100) woman who are at reproductive age, pregnant (prime or multipara) who have planned to have birth by elective cesarean section or had previous elective caesarian section without medical indication or women who had cesarean section with medical indication or
... Show MoreObjective(s): To assess women’s knowledge about health promotion after a cesarean delivery and to determine the association between women’s knowledge and their demographic data of age, level of education, and monthly income.
Methodology: A descriptive design is carried out to assess women’s knowledge about health promotion after cesarean delivery at Maternity and Pediatric Hospital in Al-Samawa City. This study starts from 26th of September 2020 up to 16th March 2021. Sample of (100) woman who are at reproductive age, pregnant (prime or multipara) who have planned to have birth by elective cesarean section or had previous elective caesarian section without medical indication or women who had cesarean section with medical indicat
A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Radar is the most eminent device in the prolonged scattering era The mechanisms involve using electromagnetic waves to take Synthetic Aperture Radar (SAR) images for long reaching. The process of setting edges is one of the important processes used in many fields, including radar images, which assists in showing objects such as mobile vehicles, ships, aircraft, and meteorological and terrain forms. In order to accurately identify these objects, their edges must be detected. Many old-style methods are used to isolate the edges but they do not give good results in the determination process. Conservative methods use an operator to detect the edges, such as the Sobel operator which is used to perform edge detection where the edge does
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreLanguage always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates
... Show MoreThe solar radiation plays an important role on the energy balance of the earthatmosphere, which is the main source of energy. Also the solar radiation is a main factor of all applications which use a solar energy as renewable energy source. The purpose of this research is to study the monthly average changes for solar radiation for the period from 1985 to 1989 by using satellite Antenna Alignment from (NASA). The result shows that the monthly average radiation changes from one year to another because of the changing of it component of atmosphere, (gases, clouds and Aerosols) and as an enhancement for this conclusion, we compared the results with the monthly average radiation at clear atmosphere where the change was slig
... Show More