Congenital absence of anterior cruciate ligament is highly uncommon occurrence. It has since been documented as a standalone anatomical entity or, more frequently, in conjunction with other congenital anomalies. Surgical treatment for this patient population has only been reported in very few cases. In this article, we share our experience in managing a case of unilateral congenital deficiency of anterior cruciate ligament (ACL) in a 13 years old female patient by physeal sparing arthroscopic ACL reconstruction, using All-inside technique.
Background: Geographic variations in the incidence of different congenital coronary anomalies are well known, but infrequently studied in the Iraqi population.
Recognition of coronary anomalies is important in patients undergoing coronary arteriogrphy; coronary interventions and cardiac surgery .Variation in the frequency of primary congenital coronary anomalies may possibly have a genetic background.
Patients and methods: Three thousands adult patients underwent diagnostic coronary angiography at two cardiac centers in Baghdad between January 2003 to March 2006. Their angiographic films were reviewed by at least two experts in coronary angiographic study.
Results: Among 3000 adult patients wh
Background: Congenital malformations are responsible for a considerable proportion of perinatal, neonatal and infant mortality in many Eastern Mediterranean countries. So this study
aims to find out the incidence, types and probable risk factors of these malformations in Baghdad.
Patients and methods: one hundred cases of congenital malformations were studied out of 8090 neonates born in 4 hospitals in Baghdad province over 5 months in 2002 (preterm, term) .The incidence , types and risk factors were analysed.
Results: the incidence of congenital malformations was 12.36/ 1000 live births, with the central nervous system malformations being the commonest. There is increased risk in consanguinous mar
The depth conversion process is a significant task in seismic interpretation to establish the link between the seismic data in the time domain and the drilled wells in the depth domain. To promote the exploration and development of the Subba oilfield, more accurate depth conversion is required. In this paper, three approaches of depth conversions: Models 1, 2, and 3 are applied from the simplest to the most complex on Nahr Umr Reservoir in Suba oilfield. This is to obtain the best approach, giving less mistakes with the actual depth at well locations and good inter/extrapolation between or away from well controls. The results of these approaches, together with the uncertainty analysis provide a reliable velocity model
... Show MoreEMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements
... Show MoreBackground and Objectives:
Poisoning is an important cause of childhood and adolescence hospital emergency presentations and admissions and a major health problem in this population sector. The
present study was designed to describe the epidemiology and pattern of poisoning in addition to its case fatality rate.
Methods:
A total of 1450 pediatric cases with poisoning admitted to the Central Teaching Hospital of Pediatrics, Baghdad, during the 10 years study period extending from the 1st of
January 1993 to 31st of December 2002, were analyzed.
Results:
The peak age for poisoning cases in the present study was 1-4 years, constituting about three quarters of total pediatric admissions with poisoning.
This paper presents a linear fractional programming problem (LFPP) with rough interval coefficients (RICs) in the objective function. It shows that the LFPP with RICs in the objective function can be converted into a linear programming problem (LPP) with RICs by using the variable transformations. To solve this problem, we will make two LPP with interval coefficients (ICs). Next, those four LPPs can be constructed under these assumptions; the LPPs can be solved by the classical simplex method and used with MS Excel Solver. There is also argumentation about solving this type of linear fractional optimization programming problem. The derived theory can be applied to several numerical examples with its details, but we show only two examples
... Show MoreVascular injury is still common in countries such as Iraq where both military and urban violence are endemic.
This is a report of a thirty eight year old civilian patient who had been inflicted with shrapnel injury during the 3rd. Gulf war, which had caused two different types of vascular injury with minimal evidence of vascular injury with evidence of only two small wounds in the neck and upper chest at the time of injury but presented few months later with a pulsatile neck mass and palpable thrill across the right supraclavicular area and upper chest.
Preoperative investigations were done including Doppler study and angiography which confirmed the presence of right common carotid artery aneurysm and
The study aimed at designing compound exercises using added weight on some skill abilities in youth soccer players aged (17 – 19) years old. The researcher sued the experimental method on (30) players aged (17 – 19) years old from Al Zawraa Sport Club. The subjects were divided into three groups and the training program was applied for (8) weeks with (3) training sessions per week. The data was collected and treated using proper statistical operations to conclude that compound exercises with weights between improved the subjects compared to the groups that did not use the added weights. Finally, the researchers recommended the necessity of using compound exercises using added weights during training sessions for youth soccer pla
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the