BACKGROUND: Clavicle fractures are common injuries in young active individuals, the mid third of the clavicle is most commonly fractured part(80% of clavicle fracture) OBJECTIVE: To compare the outcomes of operative and non operative management of displaced and or comminuted closed fracture of the mid third of clavicle in young adults PATIENTS AND METHODS: This prospective observational study of 24 patients of fracture of the mid third of the clavicle was conducted in Alkindy teaching hospital from July 2015 to January 2017 and divided into two groups; one managed by operative treatment with plate and screws and the other by non operative sling immobilization after taking the consent and the patients were seen at 2, 4, 6 weeks,3, 6, and 9 months RESULTS: The mean time of functional recovery in the operative group was 3.75 weeks while in the non operative group was 8.09(P value=0.005) which is highly significant, the mean time of fracture healing(radiological union) in the operative group was 14.25 while in the non operative group was 28.72 with P value 0.005 which is statistically highly significant, there was no significant differences between the two groups in the range of movements although the adduction was better in the operative group but not significant P value=0.120, the DASH score was 11.25, 22.25 in the operative and non operative group respectively which is highly significant P value=0.005. CONCLUSION: Operative fixation of the clavicle results in improvement in the functional outcome, shorter time of union, lower complication rate in 9 month follow up
In this work, the possibility of a multiwavelength mode-locked fiber laser generation based on Four-Wave Mixing (FWM) induced by Fe2O3-SiO2 nanocomposite material is investigated for the first time. A multiwavelength mode-locked pulses fiber laser are generated from Ytterbium–doped fiber laser (YDFL) due to the combined action of high nonlinear absorption and high refractive coefficients of Fe2O3-SiO2 nanocomposite incorporated inside YDFL ring cavity. Up to more than 20 lasing lines in the 1040–1070 nm band with an equally lines separation of ~0.6 nm have been observed by just simple variation of passive modulation of the state of the polarization and the pump power altogether. Moreover, a passively mode-locked operation of YDFL laser
... Show MoreIn this work, the precursor [2-(1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid] was synthesised from 4-aminoantipyrine and glyoxylic acid, this precursor has been used in the synthesis of new multidentate ligand [2-((E)-3-(2-hydroxyphenylimino)-1,5-dimethyl-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylimino)acetic acid][H2L] type (N2O2). The ligand was refluxed in ethanol with metal ions [VO(II), Mn(II), Co(II) and Ni(II)] salts to give complexes of general molecular formula:[M(H2L)2(X)(Y)].B, where: M=VO(II), X=0, Y=OSO3-2, B=2H2O; M=Mn(II),Co(II) ,X=Cl, Y=Cl, B=0; M=Ni(II), X=H2O, Y=Cl, B=Cl. These complexes were characterised by atomic absorpition(A.A), F.T-I.R., (U.V-Vis)spectroscopies (1H,13C NMR for ligand only), alon
... Show MoreIn this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreA resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref
... Show MoreThe problem of slow learning in primary schools’ pupils is not a local or private one. It is also not related to a certain society other than others or has any relation to a particular culture, it is rather an international problem of global nature. It is one of the well-recognized issues in education field. Additionally, it is regarded as one of the old difficulties to which ancient people gave attention. It is discovered through the process of observing human behaviour and attempting to explain and predict it.
Through the work of the two researchers via frequent visits to primary schools that include special classes for slow learning pupils, in addition to the fact that one of the researcher has a child with slow learning issue, t
In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreThis research deals with the study of top soil electrical conductive regions located within Baghdad City. The research included measuring the dissolved soil material extraction Electrical Conductivity (EC) with an aqueous solution for the top (0-30 cm) soil layer of the study area. As the electrical conductivity values increase by increasing the amount of dissolved salts in principle, we can consider that the aim of this research is to predict the amount and distribution of (soil contamination with salts) which is represented by the (Salt Index), this factor calculated for each soil representative sample taken from the region with a depth of (30 cm). Laboratory (EC) test values measured by the use of solutions (EC) digital meter for the ex
... Show More