BACKGROUND: Clavicle fractures are common injuries in young active individuals, the mid third of the clavicle is most commonly fractured part(80% of clavicle fracture) OBJECTIVE: To compare the outcomes of operative and non operative management of displaced and or comminuted closed fracture of the mid third of clavicle in young adults PATIENTS AND METHODS: This prospective observational study of 24 patients of fracture of the mid third of the clavicle was conducted in Alkindy teaching hospital from July 2015 to January 2017 and divided into two groups; one managed by operative treatment with plate and screws and the other by non operative sling immobilization after taking the consent and the patients were seen at 2, 4, 6 weeks,3, 6, and 9 months RESULTS: The mean time of functional recovery in the operative group was 3.75 weeks while in the non operative group was 8.09(P value=0.005) which is highly significant, the mean time of fracture healing(radiological union) in the operative group was 14.25 while in the non operative group was 28.72 with P value 0.005 which is statistically highly significant, there was no significant differences between the two groups in the range of movements although the adduction was better in the operative group but not significant P value=0.120, the DASH score was 11.25, 22.25 in the operative and non operative group respectively which is highly significant P value=0.005. CONCLUSION: Operative fixation of the clavicle results in improvement in the functional outcome, shorter time of union, lower complication rate in 9 month follow up
This study analyses six political cartoons selected based on their relevance to current Iraqi political issues, specifically the period between 2005 and 2015, from American online newspapers (calgecartooms.com). The selection criteria included the cartoons' satirical elements, visual rhetoric, and their ability to engage with themes such as power dynamics, social issues, and public opinion. It sheds light on how these cartoons can function as mediators of meanings between the cartoonists and the readers. The data is examined using multimodal discourse analysis (MDA), which combines language study with the analysis of other visual elements, like colors, gestures, and images, to understand meaning (O’Halloran et al., 2011). The Visual Socia
... Show MoreAcute lymphoblastic leukemia (ALL) is a cancer of the blood and bone marrow (spongy tissue in the center of bone). In ALL, too many bone marrow stem cells develop into a type of white blood cell called lymphocytes. These abnormal lymphocytes are not able to fight infection very well. The aim of this study was to investigate possible links between E3 SUMO-Protein Ligase NSE2 [NSMCE2] and increase DNA damage in the childhood patients with Acute lymphoblastic leukemia (ALL). Laboratory investigations including hemoglobin(Hb) ,white blood cell (WBC) , serum total protein , albumin ,globulin , in addition to serum total antioxidant activity (TAA) , Advanced oxidation protein products(AOPP) and E3 SUMO-Protein Ligase NSE2[NSMCE2]. Blood samples
... Show MoreNovel derivatives of 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole and 1-(´1, ´3, ´4, ´6-tetra benzoyl-β-D-fructofuranosyl)-1H- benzotriazole carrying Schiff bases moiety were synthesised and fully characterised. The protection of D- fructose using benzoyl chloride was synthesized, followed by nucleophilic addition/elimination between benzotria- zole and chloroacetyl chloride to give 1-(1- chloroacetyl)- 1H-benzotriazole. The next step was condensation reaction of protected fructose and 1-(1-chloroacetyl)-1H- benzotriazole producing a new nucleoside analogue. The novel nucleoside analogues underwent a second conden- sation reaction with different aromatic and aliphatic amines to provide new Schiff b
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreA land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show More