Joint diseases, such as osteoarthritis, induce pain and loss of mobility to millions of people around the world. Current clinical methods for the diagnosis of osteoarthritis include X-ray, magnetic resonance imaging, and arthroscopy. These methods may be insensitive to the earliest signs of osteoarthritis. This study investigates a new procedure that was developed and validated numerically for use in the evaluation of cartilage quality. This finite element model of the human articular cartilage could be helpful in providing insight into mechanisms of injury, effects of treatment, and the role of mechanical factors in degenerative
conditions, this three-dimensional finite element model is a useful tool for understanding of the stress distributions within articular cartilage in response to external loads and investigating both the prevention of injury and the pathological degeneration of the joints.
In this study, 21 models were analysed by using ANSYS workbench v12.1: four normal articular cartilage models (distal femur, patella, medial and lateral tibia). A redesign to the distal femur model was done to get osteoarthritis articular cartilage (simple and deep) seven models by making partial cut without affecting the subchondral bone, and full cut with part of the subchondral bone in different diameters. Finally a treatment done by replacing the defective parts with artificial articular cartilages with different types of treatment. The finite element analysis studied depending on a Von Mises criteria and total deformation in different activities. The results shows that Autologous Chondrocyte Implementation is the best treatment way and it is close by 87.50% to normal cartilage. This procedure can be used as a diagnostic procedure for osteoarthritic patients and to choose the best treatment options.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSinging has significant importance being a major basis for the expressive and cultural production of the societies and a real companion that reflects their artistic career and is strongly connected to the reality of the peoples and the production of the individuals, who are geniuses of arts and culture.
Rural singing represents one of the most well-known artistic singing styles in Iraq, which truly embodied the Iraqi national identity. However, it remained confined to the countryside and did not spread due to the lack of mass media and the recording technologies at that time. It has been pure virgin singing art. The theoretical framework is divided into three axes:
• The Iraqi singing heritage in the twentieth century, a hi
... Show MoreAbstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreThe aim of this study is to evaluate oxidative stress in diabetes mellitus (DM) Type1 by the measurement of Glucose-6-phosphate Dehydrogenase (G-6-PD), an enzyme expressed in human RBCs, is important in the generation of reduced glutathione which is the key product in oxidative stress controls. The Study was carried on 80 samples of blood and serum of National Diabetes Center (NDC). The study groups under fasting conditions and they divided as:20 samples of diabetes mellitus patients without complications and 20 samples of diabetes mellitus with cardiovascular (CV) complications and 20 samples of diabetes mellitus with Nephropathy (Neph) complications compared with 20 control group with average age (13-67) years.. The results sh
... Show More