Background:Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective:We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study:Retrospective study.Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclageand tension bands technique ,and group B 34 patients were fixed by 2 K. wires and tension bands technique. Clinical outcome was assessed using the system of Bostman score. Range of motion and evidence of radiological union were assessed at regular follow-ups. Results; All patients in group A gained Excellent result and good result, while only one patient gained poor result in group B . One patient (2.8%) developed superficial infection in group A and three patients( 8.8% ) developed superficial infection in group B. All fractures had united at the end of 10 weeks. Twenty two patients (31.4%) underwent a second surgery for wire removal; 5 cases in group A ( 13.9 % ) two of them due to implant related complications and 15 ( 44.1%) patients for group B mainly due to pain and interference with daily activity. Malunion or non-union was not noted in any of the cases. . Conclusion; The advantages of the cerclage and tension bands technique for fixation of displaced patella fracture are early mobilization, elimination of k-wire related complications, and ease of use in comminuted fracture pattern as well and a lower reoperation rates as compared to other method of fixation by 2 K. wires and tension bands technique. We strongly recommend its use in cases of displaced comminuted transverse fractures of patella
Cancer constitutes a serious disease and a major health problem in worldwide, a lot of people were infected with this dangerous disease, Therefore, there must be attention to this disease through diagnosis and prevention there. In this study, we determined the relationship between the Cancer and the concentration of trace elements by comparing the concentration trace elements for infected and non-infected people. The trace elements concentrations to nails are one of the diagnostic criteria that easily to detect and dated this disease without any harm to the patient. Eight nails samples were collected from cancer-infected and eight samples from non-infected of the relatives of first-degree. All samples were measured by the concentrations
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIn this work, we are obviously interested in a general solution for the calculation of the image of a single bar in partially coherent illumination. The solution is based on the theory of Hopkins for the formation of images in optical instruments in which it was shown that for all practical cases, the illumination of the object may be considered as due to a self – luminous source placed at the exit pupil of the condenser , and the diffraction integral describing the intensity distribution in the image of a single bar – as an object with half – width (U0 = 8 ) and circular aperture geometry is viewed , which by suitable choice of the coherence parameters (S=0.25,1.0.4.0) can be fitted to the observed distribution in various types of mi
... Show MoreThis research is carried out to investigate the externally post-tensioning technique for strengthening RC beams. In this research, four T-section RC beams having the same dimensions and material properties were casted and tested up to failure by applying two mid-third concentrated loads. Three of these beams are strengthened by using external tendons, while the remaining beam is kept without strengthening as a control beam. Two external strands of 12 mm diameter were fixed at each side of the web of the strengthened beams and located at depth of 200 mm from top fiber of the section (dps). So that the depth of strands to overall depth of the section ratio (dps
... Show MoreThe research Concentrates on modern Variable in the organizations that is 6 sigma. The field study is two of Iraqi industrial organizations, The first is state company of …………… , the other is the state company of ……
The problem of the research determines some questions and hypotheses, The data was Collected by question air, which contains 5 dimensions and (10) critical Successful factories .
The sample contains (42) who Works in that organizations. The points out many conclusions. The main of it, there is significant differences among the two organizations Then The research concluded with a number of important recommendations serve it's objectives .
... Show MoreClassification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreThe aim of this paper is to present a method for solving high order ordinary differential equations with two point's boundary condition, we propose semi-analytic technique using two-point oscillatory interpolation to construct polynomial solution. The original problem is concerned using two-point oscillatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by comparing with conventional methods.
Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreIn this study, the effect of pumping power on the conversion efficiency of nonlinear crystal (KTP) was investigated using laser pump-power technique. The results showed that the higher the pumping power values, the greater the conversion efficiency (η) and, as the crystal thickness increases within limitations, the energy conversion efficiency increases at delay time of (0.333 ns) and at room temperature. Efficiency of 80% at length of KTP crystal (L = 1.75 X 10-3 m) and Pin = 28MW, and also, compare the experimental results with numerical results by using MATLAB program.
The context of multibiometric plays a pivotal role in enhancing an identification system, since a biometric system is now the most physical way of identifying and verifying individuals. The feature of multibiometric could be merged to produce identification information. However, unimodal biometric systems suffer from different types of breaching. Thus, mixing biometrics with cryptography leads to overcome small variations existing between diverse acquisitions of the same biometric in order to produce the robust system. In this paper, a new robust multibiometric system is proposed to create a random key from person multibiometric, facial and fingerprint images which are used simultaneously to produce this key. Several man
... Show More