Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date. Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magnetic resonance imaging findings appeared , showing the nidus. Treatment: Acompleteen block resection accomplished successfully and the whole tumor with lesser trochanter of the femur in one mass was removed. Outcome and Follow-up: the post-operative period was uneventful. The pathological examination is consistent with osteoid osteoma. The patient was asymptomatic at one year follow up. Conclusions: lesser trochanter OO can mimic lots of pathologic entities related to the affected area, and presents a diagnostic challenge and cause a delay in the diagnosis. The delays in the diagnosis and treatment can be avoided with a high index of suspicion. Treatment should be individualized according to the surgeon’s preference and the characteristics of the case.
Purpose of research: The purpose of the article is to conduct a comparative analysis of the concept and types of puns in the Russian and Arabic languages. The main focus is on identifying similarities and differences in the definition of a pun, as well as analyzing its various types in both languages. The purpose of the study is to understand how puns are used to achieve comic or semantic effect in different cultural contexts.
Methods: The study includes an analysis of literature providing information about puns in Russian and Arabic. For comparative analysis, methods were used to compare concepts, definitions and types of puns in both languages. The phonetic, semantic and syntactic aspects of the pun are considered,
... Show MoreThe study targets exploring the similarities and differences between Iraqi and Malaysian learners of English in refusing marriage proposals. Also, it examines the favored politeness strategies that learners use to protect their interlocutors’ face, heeding both their social distance and status. Data were gathered by a Discourse Completion Task (DCT) which contained six marriage situations. Responses were analyzed based on Beebe et al.’s (1990) refusal taxonomy and Scollon et al.’s (2012) politeness system. The findings indicated that both the Iraqi and Malaysian learners preferred the indirect refusal strategies in marriage proposals, as well as the hierarchical politeness in the form of independence strategies regardless of t
... Show MoreContemporary developments in various sciences and the impact of technological changes require an integrated vision of the activities and work of the organization in Iraq in light of the high costs of products and their low quality compared to imported products of high quality and low cost, and the need to use modern cost techniques based on a clear and specific philosophy that contributes to increasing the efficiency and effectiveness of management In the business environment and how it can contribute to reducing product costs and being environmentally friendly at the same time, it is no secret that the main goal of most organizations is to maximize profitability and reduce costs to the minimum, but this matter is not achieved autom
... Show MoreThe objective of this study was to investigate and compare among five different methods of contraception including combined oral contraceptive pills (COC), Depot medroxyprogesterone acetate (DMPA), copper Intrauterine contraceptive device (IUCD), vaginal spermicides and male condom used in Hawler City through estimate of their effect, relative failure rate, percentage of use, adherence and compliance and adverse effects of each contraceptive method. In order to reach to these aims, a retrospective study was conducted in Hawler City in Azadi Health Care Center over a period of 6 months from 22th November, 2010 to 15th May, 2011 during which data collection and subjects follow up for 3 months had been achieved. A conv
... Show MoreThis study was aimed to determine bone formation markers (OST and BALP) and lysyl oxidase in diabetes and non-diabetes Iraqi acromegaly patients in addition to find the relationship among these parameters. The present study conducted 60 acromegalic patients (30 diabetes & 30 non diabetes) attending National Diabetes Center / AL-Mustansiriya University/Baghdad, and 30 healthy individuals as a control group aged (35-60) years. All patients were administrated Sandostatin drug, and they were diagnosed by physician in the hospital.FBG, GH, IGF-1, OST, BALP, and LOX were determined in all groups. The results showed a highly significant rise in all parameters (GH, IGF-1, FBG, OST, BALP, and LOX values in serum of all patients when compared with n
... Show MoreDeep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More