Objective: to evaluate the results of (Modification of Russe method) in treatment of nonunion fracture scaphoid bone by bone graft with external splintage (plaster of paris cast (pop ).
Methods:Prospective study done on 26 patients (24 male, 2 female), age range between 25-42 years (mean age 34 years), fracture site at middle 1/3 with minimal displacements with no carpal bone or radial bone injury, technique of Matte- Russe method (explore the bone through volar approach using bone graft from iliac crest (cortico-cancellous peg plus cancellus bone) with thumb spica for 90 days with period of follow up 12-18 months.
Results: out of 26 patients treated by this method , 23 patients (88.5%) union was achieved radiologically by the end of 3rd month &progressed over the next 3 months, range of motion of the wrist & power of grip increased gradually became almost comparable to the normal side by the end of sixth month , 5-7 degrees loss of dorsiflexion was residual in 6 patients . Three patients (11.5%) did not show union radiolgically after sixth postoperative month, their local symptoms were better than before surgery ,they were not keen to have another operation .No complications were noticed, wound healed well ,patient tolerance was good
Conclusion: the use of cancellous bone graft with plaster of paris (p.o.p.) splint is less demanding surgically& less coasty and resulted in good results(88.5% healed well ).we recommend this treatment as a method for treating nonunion of carpal scaphoid bone
In an intensive study of the various species of the Euglenophyceae under different environmental conditions, the algal samples were collected monthly in twelve springs and six related streams from September 2019 to August 2020 within Shaglawa district-Erbil Province in virgin areas for phycolimnological study. Twenty species of Euglenophyceaen are identified as a new record for the algal flora. These taxa consist of Colacium vesiculosum, Lepocinclis salina and L.wangi, Eutreptia viridis, Euglena chlamydophora, E. clavata,
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThis study examines traveling wave solutions of the SIS epidemic model with nonlocal dispersion and delay. The research shows that a key factor in determining whether traveling waves exist is the basic reproduction number R0. In particular, the system permits nontrivial traveling wave solutions for σ≥σ∗ for R0>1, whereas there are no such solutions for σ<σ∗. This is because there is a minimal wave speed σ∗>0. On the other hand, there are no traveling wave solutions when R0≤1. In conclusion, we provide several numerical simulations that illustrate the existence of TWS.
Disease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreBaylisascaris procyonis is a helminth parasite of raccoons Procyon lotor and represents a health concern in paratenic hosts, including humans and diverse domestic and wildlife species. In North America the helminth is expanding its geographic range. To better understand patterns of infection in the Ozark region of the USA, raccoons (n = 61) were collected in 2013-2014 from five counties in Missouri and Arkansas, USA and necropsied. We documented B. procyonis in all surveyed locations. The overall prevalence of B. procyonis was 44.3 % (95 % CI = 31.9 - 57.4) and was significantly higher in females than males. There were also significant differences in prevalence among raccoons sampled
The search (floors and transparent role in the design studios satellite channels) and presented as a study-oriented, and the research aims to identify the role of flooring transparent spaces studios satellite channels and side performative and aesthetic, and formulas design to highlight the role floors transparent spaces studios satellite channels. And highlight the importance of research, particularly in its contribution to the clarification of the concept of the relationship between transparency and performing aesthetic treatments for floors by clarifying its role in the designs of the internal spaces of the studios, as well as his contribution to the founding of the theory of looking at the base of such concepts. To achieve the object
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More