Background: The anterior knee pain is an important chief complaint of the patients with knee osteoarthritis due to patellofemoral pathology. The pain receptors denervation can be achieved by circumferential denervation of the patellar area by a process of electrocautery.
Objectives: The aim of current study is to assess the pain after total knee arthroplasty (TKA) by patelloplastywith and without circumferential denervation via electrocautery at a minimum follow up with 1 year separately for each patient.
Type of the study:Cross- sectional study.
Methods: Thirty five patients,with mean age of about (62.8) years, were enrolled in this pros
... Show MoreBackground: The physiologic, biochemical and anatomic changes that occur during pregnancy are extensive and may be systemic or local. However, most of these changes return to pre pregnancy status six weeks postpartum. The aim of the study was to investigate the effect of dental caries among preterm postpartum women and it's relation to baby birth weight and salivary interleukin-6 (IL-6). Materials and methods: 66 postpartum women were examined, 33 preterm postpartum women (study group) and 33 full term postpartum women (control group). Dental caries was recorded using, decayed, missing and filled surfaces index, also assess the decayed lesion by severity. Salivary samples were taken from all subjects to estimate salivary IL-6 levels. Babie
... Show MoreThe research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to the creation of Eve and the class
... Show MoreBackground: Recent implant surgical approach aims to cause less trauma, invasiveness and pain as much as possible and to reduce patient and surgeon discomfort, time of surgery and time needed for functional implant loading. Flapless surgical techniques considered recently as one of the most popular techniques that may achieve these aims especially enhancing osseointegration and subsequently implant stability within less time than the traditional flapped surgical technique. So this study aimed to make a comparison between flapped and flapless surgical techniques in resulted implant stability according to resonance frequency analysis RFA and in duration of surgical operation. Materials and methods: A total of 26 patients with 41 implants (o
... Show MoreBackground: Lowering the amount of iodinated contrast material and tube voltage may increase pulmonary artery opacification and thrombus identification without compromising picture quality.
Objectives: To explore the efficiency of using lower tube voltage and a lower contrast medium dose for conducting computed tomography for pulmonary angiography (CTPA) aiming to increase its accuracy in detecting pulmonary thromboembolism (PTE).
Subjects and Methods:100 patients scheduled for CTPA with a preoperative diagnosis of PTE were grouped into two: group A, (50 patients) got 1 mL/kg at 120 kV and group B, (50 patients) received 0.5 mL/kg at 80 kV.The tec
... Show MoreSome feline intestinal parasites such as Toxocara, Giardia, and Cryptosporidium can spread to humans through feces. Therefore, it is important to prevent exposure of family members by screening cat fecal samples twice per year for potential treatment regimes. This study was initiated to compare and identify gastrointestinal parasites of domestic and stray cats (Felis domesticus) in Baghdad City, Iraq. Parasite eggs and oocysts were identified under light microscopy by applying standard laboratory techniques (flotation and sedimentation). Overall, 59 of 121 (48.7%) fecal samples were positive for intestinal parasites. The rate of infection by Toxoplasma gondii was (3.31%), Isospora spp. (6.61%), Cryptosporidium spp. (31.4%), and Toxocara spp
... Show MoreBackground: Restoration of the gingival margin of Class II cavities with composite resin continues to be problematic, especially where no enamel exists for bonding to the gingival margin. The aim of study is to evaluate the marginal leakage at enamel and cementum margin of class II MOD cavities using amalgam restoration and modern composite restorations Filtek™ P90, Filtek™ Z250 XT (Nano Hybrid Universal Restorative) and SDR bulk fill with different restoratives techniques. Materials and method: Eighty sound maxillary first premolar teeth were collected and divided into two main groups, enamel group and cementum group (40 teeth) for each group. The enamel group was prepared with standardized Class II MOD cavity with gingival margin (1 m
... Show MoreASTRACT
The current study aimed to identify the quality of health services provided by the Omani health sector through the comparison between public and private hospitals in Dhofar Governorate, Oman. A questionnaire has been developed to collect data from 360 patients who received health services in one public Hospital (Sultan Qaboos) and three private Hospitals (Badr Al-Sama, Lifeline, and Al-Hakeeim). The data were analyzed using independent samples T-Test and One Way ANOVA. The results of the study showed that the quality levels of health services offered in private hospitals were better than public hospitals. The study results also reveled that there are significant differences between public hospitals and private hos
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More