Preferred Language
Articles
/
6BYhfYgBVTCNdQwCqnc9
Functional outcome of interlocked intramedullary nailing fixation in management of closed tibia shaft fractures
...Show More Authors

Objective: To assess prospectively functional outcome of interlocked intramedullary nailing fixation in management of closed tibia shaft fractures. Methodology: This prospective study included 134 patients with closed shaft tibia fractures with age 18-60 years and isolated closed fracture of shaft of tibia. The fractures were fixed by interlocking intramedullary nail. At follow-up after 12 months postoperatively, the functional outcome was assessed radiographically for the sign of union and clinically according to Klemm-Borner criteria. Results: The mean age was 38.55 years. Out of 134 patients, 55.2% were male. The cause was road traffic accident in 44.8%, majority of the fracture occur in the mid-shaft (41.8%), and oblique fracture was the commonest type which accounted for 35.1%. The anterior knee pain was the commonest complications after surgery (11.9%). More than 90% patient achieved normal o or less than 5 angulation. The functional outcome was excellent in 67.9%, good in 29.9% and only 2.2% had fair results. Conclusion: Interlocking intramedullary nailing is a good choice in the treatment of most closed shaft tibia fractures. (Rawal Med J 202;46:890-893)

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 22 2019
Journal Name
Innovations In Pharmacy
Evaluate Factors Influencing Depression in Baghdad: Using Deck-Depression Inventory
...Show More Authors

Objective: This study goal was to screen participants from different settings in Baghdad for depression using Beck Depression Inventory (BDI) scale and identify factors influencing the levels of depression. Methods: This cross-sectional study included a convenience sample of 313 people from four settings (teaching hospital, college of medicine, college of pharmacy, and high school) in Baghdad, Iraq. The participants were screened using paper survey relying on the BDI scale during spring 2018. Using multiple linear regression analysis, we measured the association between depression scores and six participant factors. Results: The overall prevalence of depression in our sample was 57.2%. Female participants had higher BDI

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Agricultural Mechanization In Asia, Africa And Latin America
Which plow is more suitable for tillage farming in Iraq?
...Show More Authors

There were two types of plows used widely in agricultural fields in the country. The first plow was moldboard plow, while the second one was chisel plow. There were large numbers of Iraqi farmers that used chisel plow for such farming practices. Researchers found that moldboard plows gave the highest rate of carbon dioxide emission. They observed that that with chisel plows they got the lowest carbon dioxide emission. Chisel plow saved energy as compared to moldboard plow and the cost of using the chisel plows was less than the moldboard plows. Chisel plow decreased carbon dioxide emissions from the soil and improve soil properties. The benefits of using chisel plows were more than using moldboard plows.

View Publication
Scopus (5)
Scopus
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
HLA Typing in Iraqi Patients with Obesity and Primary Osteoarthritis.
...Show More Authors

Background: Osteoarthritis (OA) is a degenerative joint disease. It is one of the major causes of disability in developed and developing countries. Human leukocyte antigen (HLA) as part of immune system has a role in the disease process.Objectives: To investigate whether there is an association between HLA class II-DRB and OA.Methods: A case control study with 26 patients with osteoarthritis and 22 apparently healthy obese control persons matching in ethnicity were enrolled in this study during the period between October 2012 till March 2013. Direct interview was done with each patient and HLA typing was done by molecular method using Sequence Specific Primer (PCR-SSP) method using One Lambda Kit-USA. Results: The results showed that fem

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The general budget and censorship on it in Iraqi legislation
...Show More Authors

The main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Lark
ADJECTIVES WITH THE SUFFIX -OVATE - / - EVAT IN MODREN RUSSIAN LANGUAGE
...Show More Authors

يكشف هذا المقال عن مشكلة الصفات ذات المكون الكمي والتي تعتبر واحدة من اقوى الموارد المكونة للكلمات التعبيرية والتقويمية و يتم تحليل التركيبات الدلالية ذات الاوجه المتعددة التي تنشا من عملية توظيف الصفات المشتقة بمساعدة اللواحق والتي تدل على الاتجاه العام للغات السلافية وذلك لتطوير الدلالات العاطفية والتقييمية في الكلمات ذات معنى الميزة او الخاصية يتم تقديم تعريف انماط تكوين المعاني الضمنية في دلالات

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Graphic privacy in vector graphics design for children's publications
...Show More Authors

         The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Lymphocyte phenotyping in untreated children patients with chronic allergic asthma
...Show More Authors

This study aimed to isolate and phenotype lymphocytes in untreated children patients with chronic allergic asthma. To reach such aim the study involved (25) patients from children (17 male and 9 female) whom their ages where between (3-10) years, in addition to (15) apparently healthy children (9 male and 6 female) in the same ages involved as control group. The data demonstrated that there was a significant increase in the mean percentages of T-lymphocytes (CD3+ cells) in the peripheral blood of patients (66.75±0.29)**, in comparison with control group (43.58±0.19), a significant increase in the mean percentages of T-helper lymphocytes (CD4+ cells) in the pe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Traumatic Symptoms and Psychological Reactions Associated with Earthquakes in Iraq
...Show More Authors

The study aims to identify the Traumatic Symptoms (physiological, emotional, and cognitive) of earthquakes among the targeted sample; it also aims to identify the significant differences between psychological, emotional, and cognitive traumatic symptoms of earthquakes according to the gender and age of participants. The study additionally seeks to identify thepsychological positive-negative reactions associated with earthquakes according to gender and age of the participants. To measure the traumatic symptoms of earthquakes, a 4-point Likert scale questionnaire with (20) items (questions) accompanied with a 4-point Likert scale questionnaire with (18) items (questions) were used to measure the Psychological positive-n

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
The Winged Bull in the Assyrian Civilization- A Semiotic Perspective
...Show More Authors

Every cultural achievement is a creative text, and every text is a group of signs. The Winged Bull sculpture is a sort of text that is not confined to some signs; indeed, its cultural signs go far beyond as they are open-ended, everlasting and it lends itself to various horizons of interpretation. The recipient has to combine the signs of this sculpture, which belong to different patterns, in the pursuit for perfection so that he can decode its media message.
I have tackled this sculpture by adopting a semiotic approach. The semiotic approach is a modern critical approach which is as wide as culture and as rich as knowledge. It has been linked to modernism, which in turn has been linked to modern critical approaches, because it can

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref