Background:Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective:We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study:Retrospective study.Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclageand tension bands technique ,and group B 34 patients were fixed by 2 K. wires and tension bands technique. Clinical outcome was assessed using the system of Bostman score. Range of motion and evidence of radiological union were assessed at regular follow-ups. Results; All patients in group A gained Excellent result and good result, while only one patient gained poor result in group B . One patient (2.8%) developed superficial infection in group A and three patients( 8.8% ) developed superficial infection in group B. All fractures had united at the end of 10 weeks. Twenty two patients (31.4%) underwent a second surgery for wire removal; 5 cases in group A ( 13.9 % ) two of them due to implant related complications and 15 ( 44.1%) patients for group B mainly due to pain and interference with daily activity. Malunion or non-union was not noted in any of the cases. . Conclusion; The advantages of the cerclage and tension bands technique for fixation of displaced patella fracture are early mobilization, elimination of k-wire related complications, and ease of use in comminuted fracture pattern as well and a lower reoperation rates as compared to other method of fixation by 2 K. wires and tension bands technique. We strongly recommend its use in cases of displaced comminuted transverse fractures of patella
The variation in wing morphological features was investigated using geometric morphometric technique of the Sand Fly from two Iraqi provinces Babylon and Diyala . We distributed eleven landmarks on the wings of Sand Fly species. By using the centroid size and shape together, all species were clearly distinguished. It is clear from these results that the wing analysis is an essential method for future geometric morphometry studies to distinguish the species of Sand Flies in Iraq.
Background: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randoml
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Even though image retrieval is considered as one of the most important research areas in the last two decades, there is still room for improvement since it is still not satisfying for many users. Two of the major problems which need to be improved are the accuracy and the speed of the image retrieval system, in order to achieve user satisfaction and also to make the image retrieval system suitable for all platforms. In this work, the proposed retrieval system uses features with spatial information to analyze the visual content of the image. Then, the feature extraction process is followed by applying the fuzzy c-means (FCM) clustering algorithm to reduce the search space and speed up the retrieval process. The experimental results show t
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition. This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.
Formation of Au–Ag–Cu ternary alloy nanoparticles (NPs) is of particular interest because this trimetallic system have miscible (Au–Ag and Au–Cu) and immiscible (Ag– Cu) system. So there is a possibility of phase segregation in this ternary system. At this challenge it was present attempts synthetic technique to generate such trimetallic alloy nanoparticles by exploding wire technique. The importance of preparing nanoparticles alloys in distilled water and in this technique makes the possibility of obtaining nanoparticles free of any additional chemical substance and makes it possible to be used in the treatment of cancer or diseases resulting from bacterial or virus with least toxic. In this work, three metals alloys Au-Ag-Cu
... Show More