Background:Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective:We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study:Retrospective study.Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclageand tension bands technique ,and group B 34 patients were fixed by 2 K. wires and tension bands technique. Clinical outcome was assessed using the system of Bostman score. Range of motion and evidence of radiological union were assessed at regular follow-ups. Results; All patients in group A gained Excellent result and good result, while only one patient gained poor result in group B . One patient (2.8%) developed superficial infection in group A and three patients( 8.8% ) developed superficial infection in group B. All fractures had united at the end of 10 weeks. Twenty two patients (31.4%) underwent a second surgery for wire removal; 5 cases in group A ( 13.9 % ) two of them due to implant related complications and 15 ( 44.1%) patients for group B mainly due to pain and interference with daily activity. Malunion or non-union was not noted in any of the cases. . Conclusion; The advantages of the cerclage and tension bands technique for fixation of displaced patella fracture are early mobilization, elimination of k-wire related complications, and ease of use in comminuted fracture pattern as well and a lower reoperation rates as compared to other method of fixation by 2 K. wires and tension bands technique. We strongly recommend its use in cases of displaced comminuted transverse fractures of patella
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreBackground: Piezosurgery improved the split approach by making it safer, easier, and less prone to complications when treating extremely atrophic crests. Densah drills, with their unique design, expand the ridge by densifying bone in a reverse, non-cutting mode. Objective: To assess the effectiveness of sagittal piezosurgery, which involves cutting bone to the full implant depth and then expanding it using osseodensification drills. We use this technique to expand narrow alveolar bones and simultaneously place dental implants in the maxillary and mandibular arches. Methods: Fourteen patients received 31 dental implants. The maxillary arch received 19, and the mandible received 12 dental implants. This study will include patients who
... Show MoreBackground: techniques of image analysis have been used extensively to minimize interobserver variation of immunohistochemical scoring, yet; image acquisition procedures are often demanding, expensive and laborious. This study aims to assess the validity of image analysis to predict human observer’s score with a simplified image acquisition technique. Materials and methods: formalin fixed- paraffin embedded tissue sections for ameloblastomas and basal cell carcinomas were immunohistochemically stained with monoclonal antibodies to MMP-2 and MMP-9. The extent of antibody positivity was quantified using Imagej® based application on low power photomicrographs obtained with a conventional camera. Results of the software were employed
... Show MoreThe aim of this paper is to present a method for solving third order ordinary differential equations with two point boundary condition , we propose two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by compared with conventional method .
In this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image, the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.
In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes. Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo
... Show MoreA fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreSelective recovery of atropine from Datura innoxia seeds was studied. Applying pertraction in a rotating film contactor (RFC) the alkaloid was successfully recovered from native aqueous extracts obtained from the plant seeds. Decane as a liquid membrane and sulfuric acid as a stripping agent were used. Pertraction from native liquid extracts provided also a good atropine refinement, since the most of co-extracted from the plant species remained in the feed or membrane solution. Solid–liquid extraction of atropine from Datura innoxia seeds was coupled with RF-pertraction in order to purify simultaneously the extract obtained from the plant. Applying the integrated process, proposed in this study, a product containing 92.6% atropine was
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More