Background: Osteoid osteomaa benign tumor is unusual before the age of 5 or after age 30 and is more prevalent in men. The main symptom is pain, which is typically severe and responsible for nocturnal awakenings. The conditons usually diagnosed through radiological imagine and confirmed by Histopathology.
Objectives: To assess the effectiveness and the complications that had been risen during the surgical procedure of osteoid osteoma using en bloc resection.
Methods: (10) Patients diagnosed with osteoid osteomawere treated with enbloc surgical reseaction were included in this study.the study took place at Al Yarmouk teaching hospital.the from April 2017-october 2018 and included 10 patients..(7) male, (3) females.The mean age of the sample was 18±4 years. descriptive and inferential statistical sanalysis was fulfill the study objectives..
Results: There was significant decrease in their median pain scores after 8 weeks of treatment (t test , P <0 .05).Total pain resolution and cessation of analgesics were achieved in 9 of 10 patients after 8 weeks post-operatively. P value was set at 0.05 or less.SPSS software version 20 was used for data entry and statistical calculations
Conclusions: En bloc resection of osteoidosteoma is very safe and effective procedure with a very low complications rates.
In this paper, some Bayes estimators of the reliability function of Gompertz distribution have been derived based on generalized weighted loss function. In order to get a best understanding of the behaviour of Bayesian estimators, a non-informative prior as well as an informative prior represented by exponential distribution is considered. Monte-Carlo simulation have been employed to compare the performance of different estimates for the reliability function of Gompertz distribution based on Integrated mean squared errors. It was found that Bayes estimators with exponential prior information under the generalized weighted loss function were generally better than the estimators based o
This research deals with the topic (Fantasy Parody in the Design of the Advertisement) in view of the important role that fantasia plays in designing the most creative and attractive advertisements to the recipients. The research problem lies in accordance with the following question:
What is the Fantasy Parody in the Design of the Advertisement?
It means the imagination, the unfamiliar; and features that emerge for it that distinguish it from other concepts. Fantasy advertisement is creativity in innovative ways, either through collage, merging, or the use of various artistic expressions in terms of intellectual and cultural awareness. When uses in the parody of advertisement, it has helped to come up with an aesthetic experie
This paper presents the application of nonlinear finite element models in the analysis of dappedends pre-stressed reinforced concrete girders under static loading by using ANSYS software. The girder dimensions are (4.90 m span, 0.40 m depth, 0.20 m width, 0.20 m nib depth, and 0.10 m nib length) and the parameters considered in this research are the pre-stress effect, and strand profile (straight and draped). The numerical results are compared with the experimental results of the same girders. The comparisons are carried out in terms of initial prestress effect, load- deflection curve, and failure load. Good agreement was obtained between the analytical and experimental results. Even that, the numerical model was stiffer than the experiment
... Show MoreDuring a survey on the helminthic parasites of three species of turtles in the north part of Iraq, five species of nematodes were recorded for the first time in Iraq. They were all found in the intestine. These are, Camallanus microcephalus (Dujardin, 1845) recorvered from the turtle Clemmys caspica; Spironoura japonensis (Yamaguti, 1935) from Triopyx eup¬hraticus and Angusticaecum holopterum (Rudolphi, 1819), and Tachygonetria nicollei (Seurat, 1918) from the turtle Testudo graeca. All of the localities and hosts are newly recorded in Iraq.
Currently voting process is paper based form, by using voting card or paper; thus the counting method is done manually, which exhausts a lot of time. Obsolete votes may be possibly occurring. This paper introduced a system in which voting and counting is done with the help of computer. The election process would be easier, it saves time, avoid errors while counting and obsolete votes are reduced. Electronic voting (E-voting) system is a voting system in which the election related data is stored and handled digitally, it would become the quickest, cheapest, and the most efficient way to administer election and count vote it is considered a means to further enhance and strengthen the democratic processes in modern information societies. Th
... Show MoreGod Almighty has imposed on us obligations and set limits on us, and among these obligations is the prayer, which is considered a pillar of Islam. And recently on the statement of its importance, and through extensive explanations, they elaborated on the statement of its pillars, its obligations, its Sunnahs, its rituals, and its bodies, and it is known that the imam in prayer is an important part of the parts of prayer. Whoever assumes this responsibility must be aware of these conditions, the most important of which is jurisprudence in religion, and there has been a disagreement between the jurists, especially the owners of the four schools of thought, about who is qualified to lead the imamate, and this is within many and wide details
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreMR Younus, Alustath, 2011
Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses(1–100) nm. Effective mediator theories(EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO2 nanofilms. The results show different opacity behaviors at different wavelength ranges(ultraviolet, visible, and infrared). The results depict that th
... Show MoreThe CIGS/CdS p-n junction thin films were fabricated and deposited at room temperature with rate of deposition 5, and 6 nm secG1 , on ITO glass substrates with 1mm thickness by thermal evaporation technique at high vacuum pressure 2×10G5 mbar, with area of 1 cm2 and Aluminum electrode as back contact. The thickness of absorber layer (CIGS) was 1 µm while the thickness of the window layer CdS film was 300 nm. The X-ray Diffraction results have shown that all thin films were polycrystalline with orientation of 112 and 211 for CIGS thin films and 111 for CdS films. The direct energy gaps for CIGS and CdS thin films were 1.85 and 2.4 eV, respectively. Atomic Force Microscopy measurement proves that both films CIGS and CdS films have nanostru
... Show More