Abstract Background: The hip joint and lumbar spine are both anatomically and functionally closely related as had shown by many authors. So the abnormality in one area can affect the other e.g. hip joint osteoarthritis can cause lumbar sagittal malalignment and backache. Objectives: is to see if there is significant improvement in backache after total hip replacement? And which degree of backache improvement is associated with significant changes in lumbar lordosis? Methods and patients: a prospective open trial study was performed on 30 patients who had severe hip osteoarthritis and chronic low back pain. Total hip replacement was performed to all patients. Backache and lumbar lordosis were measured by visual analogue scale and Cobb’s angle respectively both before and 6 months after surgery. Patients were divided into 3 groups according to grade of improvement in backache after surgery. Results: The improvement in low back pain after surgery was statistically significant for all patients and for each group separately, while the changes in lumbar lordosis were not statistically significant neither for all patients nor for any group separately. Conclusions: total hip replacement surgery has significant positive effect on backache. There is no significant correlation between improvement in backache and changes in lumbar lordosis.
The present investigation focuses on the response of simply supported reinforced concrete rectangular-section beams with multiple openings of different sizes, numbers, and geometrical configurations. The advantages of the reinforcement concrete beams with multiple opening are mainly, practical benefit including decreasing the floor heights due to passage of the utilities through the beam rather than the passage beneath it, and constructional benefit that includes the reduction of the self-weight of structure resulting due to the reduction of the dead load that achieves economic design. To optimize beam self-weight with its ultimate resistance capacity, ten reinforced concrete beams having a length, width, and depth of 2700, 100, and
... Show MoreIn this paper, we study, in details the derivation of the variational formulation corresponding to functional with deviating arguments corresponding to movable boundaries. Natural or transversility conditions are also derived, as well as, the Eulers equation. Example has been taken to explain how to apply natural boundary conditions to find extremal of this functional.
The purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.
Background: Polycystic ovary syndrome (PCOS) is
the most common form of chronic anovulation
associated with androgen excess; it occurs in about 5
– 10% 0f reproductive age women. Metabolic
syndrome is characterized by insulin resistance,
hypertension, obesity, abnormalities of blood clotting
and dyslipidemia.
Adult women with PCOS have an increased
prevalence of the metabolic syndrome(MBS).
Objectives: To detect the prevalence of metabolic
syndrome in women with proved PCOS, attending the
Specialized Center for Endocrinology and Diabetes, in
Baghdad.
Materials and methods : A total number of 40
women with proved PCOS were included in this study
which was conducted in the Specialized Center f
In this paper we generalize some of the results due to Bell and Mason on a near-ring N admitting a derivation D , and we will show that the body of evidence on prime near-rings with derivations have the behavior of the ring. Our purpose in this work is to explore further this ring like behavior. Also, we show that under appropriate additional hypothesis a near-ring must be a commutative ring.