Preferred Language
Articles
/
6hYofYgBVTCNdQwCwneK
Functional outcomes of sandwich reconstruction technique for giant cell tumor around the knee joint
...Show More Authors

Objective: To evaluate the functional outcomes after extended curettage and reconstruction using a combination of bone graft and bone cement (sandwich). Methodology: In this prospective case series 16 skeletally mature patients with primary giant cell tumor around the knee were included. Patients with previous surgically treated, malignant transformation, degenerative knee changes and those presenting with pathological fracture were excluded. The tumor was excised with bone graft filling space beneath the articular cartilage and a block of gel foam was placed over the cortical surface of picked bone graft. Remaining cavity was filled with polymethylmethacrylate cement (sandwich) with or without internal fixation. The func tional evaluation was done us ing Musculoskeletal Tumor Society (MSTS) Score six months postoperatively and after one year. Schatzker and Lambert Score was used in the last visit to assess the functional outcome Results: The mean MSTS Score was 27.13±3.030 (range, 20-30) and the mean functional arc of motion around the knee was 123.13±12.230 degrees (range, 90–135). According to Schatzker and Lambert Score 75% had excellent results, 12.5% had good results and 12.5% had fair results. Two patients (12.5%) had a recurrence of the tumor, and one (6.25%) developed postoperative fracture in the distal femur. Conclusion: Sandwich reconstruction for giant cell tumor is a good option for definite management and there is improvement in the quality of the patient's life. (Rawal Med J 202;45:637-640).

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 22 2019
Journal Name
Chalcogenide Letters
CONCENTRATION EFFECTS ON ELECTRONIC AND SPECTROSCOPIC PROPERTIES OF ZnCdS WURTZOIDS: A DENSITY FUNCTIONAL THEORY STUDY
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Differential Equations
Dynamical Behaviours of Stage-Structured Fractional-Order Prey-Predator Model with Crowley-Martin Functional Response
...Show More Authors

In this paper, the dynamic behaviour of the stage-structure prey-predator fractional-order derivative system is considered and discussed. In this model, the Crowley–Martin functional response describes the interaction between mature preys with a predator.  e existence, uniqueness, non-negativity, and the boundedness of solutions are proved. All possible equilibrium points of this system are investigated.  e su‰cient conditions of local stability of equilibrium points for the considered system are determined. Finally, numerical simulation results are carried out to con‹rm the theoretical results.

Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
Stability Analysis of A stage Structure Prey-Predator Model with Hollimg Type IV Functional Response
...Show More Authors

In this paper a stage structure prey-predator model with Hollimg type IV functional response is proposed and analyzed. The local stability analysis of the system is carried out. The occurrence of a simple Hopf bifurcation and local bifurcation are investigated. The global dynamics of the system is investigated with the help of the Lyapunov function. Finally, the analytical obtained results are supported with numerical simulation and the effects of parameters system are discussed. It is observed that, the system has either stable point or periodic dynamics.

View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Multi-Objective Genetic Algorithm-Based Technique for Achieving Low-Power VLSI Circuit Partition
...Show More Authors

     Minimizing the power consumption of electronic systems is one of the most critical concerns in the design of integrated circuits for very large-scale integration (VLSI). Despite the reality that VLSI design is known for its compact size, low power, low price, excellent dependability, and high functionality, the design stage remains difficult to improve in terms of time and power. Several optimization algorithms have been designed to tackle the present issues in VLSI design. This study discusses a bi-objective optimization technique for circuit partitioning based on a genetic algorithm. The motivation for the proposed research is derived from the basic concept that, if some portions of a circuit's system are deactivated during th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 06 2013
Journal Name
Robotica
Function approximation technique-based adaptive virtual decomposition control for a serial-chain manipulator
...Show More Authors
SUMMARY<p>The virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr</p> ... Show More
View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparative study between Harmonic FOCUSTM to clamp and tie technique for total thyroidectomy
...Show More Authors

Background: Thyroid surgery has undergone many changes during the past 2 decades, including the introduction of new surgical techniques such as endoscopic or video-assisted approaches, anesthesia care, intraoperative nerve monitoring and new hemostatic tools
Objectives: to assess the efficacy and safety of Harmonic Focus shears in total thyroidectomy compared with conventional surgical technique.
Patients and methods: prospective study conducted from October 2011 till January 2016, two handers and nine patients with benign and malignant thyroid diseases, scheduled for total thyroidectomy in a governor and private hospitals were enrolled randomly into 2 groups, group A consists of 105 patient who undergone a total thyroidectomy usin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Optimum conditions for ascorbic acid determination in three Iraqi citrus using HPLC technique
...Show More Authors

A high-performance liquid chromatography method was employed for the quantitative determination of ascorbic acid (AA) which called vitamin C in three types of Iraqi citrus (orange mandarin and aurantium ) and to establish this goal , evaluation of ascorbic acid degradation is so important due to its significant criticality when exposure to ordinary atmospheric conditions. The chromatographic analysis of AA was carried out after their sequential elution with KH2PO4 ( as mobile phase) by reverse-phase HPLC technique with C8 column and UV detection at 214 nm. .Bad resolutions was appeared clearly for C8 column , so another alternative condition were carried out to improve the resolution by replacement of C8 by C18 column .Statistical treat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
Robust Blind Watermarking Technique Against Geometric Attacks for Fingerprint Image Using DTCWT-DCT
...Show More Authors

In this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Textural Properties Characterization for NaX and FeX Zeolites by Nitrogen Adsorption-desorption Technique
...Show More Authors

The zeolite's textural properties have a significant effect on zeolite's effectiveness in the different industrial processes. This research aimed to study the textual properties of the NaX and FeX zeolites using the nitrogen adsorption-desorption technique at a constant low temperature. According to the International Union of Pure and Applied Chemistry, the adsorption-desorption isotherm showed that the studied materials were mixed kinds I/II isotherms and H3 type hysteresis. The Brunauer-Emmett-Teller isotherm was the best model to describe the nitrogen adsorption-desorption better than the Langmuir and Freundlich isotherms. The obtained adsorption capacity and Brunauer-Emmett-Teller surface area values for NaX were greater than FeX. Ac

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref