Preferred Language
Articles
/
jkmc-324
The Functional Results of Surgical Percutaneous Joystick Reduction Therapy for Isolated Severely Angulated Radial Neck Fracture in Children
...Show More Authors

Background: Radial neck fractures in children account for 5 to 10% of all elbow fractures in children. They are extra-articular fractures of the radius proximal to the bicipital tuberosity. The physis is typically involved as a Salter-Harris I or II pattern. Alternatively, the fracture sometimes is extraphyseal, through the metaphysis. In children there is considerable potential for remodeling after these fractures. Up to 30° of radial head tilt and up to 3 mm of transverse displacement are acceptable. Many modalities of treatment are available regarding Surgical &Non-Surgical treatments. Objectives: To evaluate the functional outcome after surgical percutaneous joystick reduction therapy of severely angulated radial neck fracture in children. Type of the study: A prospective study. Methods: During the period between February/2012 and May/2015, we made a prospective study of (18) patients suffered from O′Brien type II&III radial neck fracture with severe angulation that require surgery seen at Al-Kindy Teaching Hospitals. However, we select a group of children who had more than 30° of Radial head angulation really cannot treated by conservative method. Angulated radial neck fractures in children reduced with a percutaneous Kirschner wire. We select of surgical procedure after failure of thumbing intraoperatively. The primary indication for surgery was changing type II&III to typeI which can go on in manage conservatively. Results: All the (18) patients treated with percutaneous pinning techniques were followed-up, clinically and radiographically evaluated pre-surgery, post-surgery and finally (6) months after surgery. The mean angulation of the fractures was 64° (30° - 90°) before reduction and 10°(0° - 22°) after reduction. Mean fracture displacement after reduction in all cases was less than 3 mm. Range of Motion (ROM) in flexion, extension, pronation and supination was the functional parameter in our study as graded by (the grading system of Steele). We obtained an outcome of excellent results in 15 patient (83%), good results in 3 patients (17%) and we have no fair or poor results. Conclusions Percutaneous Joystick Reduction Techniqueusing K-wire in children with radial neck fractures is a safe, short, easy procedure requires only good technical measures, minimally invasive in nature with minimal hospitalization time, has a minimal morbidity and complication rates, it is recommended surgical treatment that can achieve recovery of normal radial neck angulation, elbow motion and yielding excellent results.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Achieve breastfeeding book and theft book To the end of the door cut the way of the manuscript Sailing Forum for Sheikh Ibrahim bin Mohammed Halabi (T: 659 H): Study and achieve
...Show More Authors

Achieve breastfeeding book and theft book
To the end of the door cut the way of the manuscript
Sailing Forum for Sheikh Ibrahim bin Mohammed Halabi
(T: 659 H)

View Publication Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact dimensions the Training process of the in components intellectual capital: Exploratory search in the National Insurance Company
...Show More Authors

The concept of training is no longer traditionally understood Limited organize traditional training courses, but has become a strategic choice in the investment and development of human resources system, attic trying to find the answer to the core problem of the study which

is the extent to which the training process, the traditional form that meets the needs of the company the development of intellectual capital.This research aimstostatementof the impact dimensions the training process(training role, support or top management , training programs, modern technology)of the in components Intellectual Capital(Human Capital, Structural Capital, Customer Capital) and provide the top management of the Company for the development of sci

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of The College Of Education For Women
The Poetics of Mourning and the American Elegy in Walt Whitman's "When Lilacs Last in the Dooryard Bloom'd"
...Show More Authors

Walt Whitman adds a poetic twist to the relationship of man’s body, soul with the universe. His inspiration in writing his elegy, "When Lilacs Last in the Dooryard Bloom'd," draws on aesthetico-political resources. Major amongst these is his leaning towards the American Transcendentalist idea of the "Over-Soul".  The basic topoi in his poems is thus his identification of nature with the soul of man. The idea of the Over-Soul sheds light on the three stages of human loss: suffering, despair, and compensation. Whitman witnessed two political events, the outbreak of the civil war and Abraham Lincoln's death, which were of a particular importance to his life and work: they helped him shape a form and thematic concerns of his own. Buil

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The effect of losing one view of the independent variableAnd its location in simple regression analysis
...Show More Authors

The objective of the research , is to shed light on the most important treatment of the problem of missing values of time series data and its influence in simple linear regression. This research deals with the effect of the missing values in independent variable only. This was carried out by proposing missing value from time series data which is complete originally and testing the influence of the missing value on simple regression analysis of data of an experiment related with the effect of the quantity of consumed ration on broilers weight for 15 weeks. The results showed that the missing value had not a significant effect as the estimated model after missing value was consistent and significant statistically. The results also

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Int. J. Nanoelectronics And Materials
Comparsion of the physical properties for CdS and CdS doped PVA thin films prepared by spray pyrolysis
...Show More Authors

Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Development of an ANN Model for RGB Color Classification using the Dataset Extracted from a Fabricated Colorimeter
...Show More Authors

Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an object under de

... Show More
Preview PDF
Scopus Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Strategic influence of Robinson and self questioner at progressing the reading comprehension for primary sixth class students
...Show More Authors

Recent research looking for acknowledgment of strategically influence of Robinson and self question at progressing the reading comprehension for students of sixth class .

To achieve research goal so the researcher mentally chose primary sixth class  at  the school (Tashti the primary) that followed education directorate of province (Jamjamal)/Suliymania for the scholastic year 2012-2013 as application field for their experiment of boys' number reached to (95) (female and male)students in reality (32) of the first experimental group and (31) student (female and male) from controlled group, the researcher rewarded between of three variable groups (timing period, intelligence ,Kurdish language degr

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and Verification of the Hydraulic Model for Blue Nile River from Roseires Dam to Khartoum City
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing i

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Aro-the Scientific Journal Of Koya University
A Comparative Study for String Metrics and the Feasibility of Joining them as Combined Text Similarity Measures
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF