Introduction: An aneurysmal bone cyst are enigmatic lesion of unknown cause and presentation and are difficult to distinguish from other lesions, it is a benign, but expansible tumor like lesion that generally occurs in the long bones. An aneurysmal bone cyst arising from the flat bone like clavicle is rare . Case presentation: We report a 12-year-old girl child with an aneurysmal bone cyst of the lateral third of left clavicle treated with enblock resection. The pathologic findings confirmed the diagnosis of aneurysmal bone cyst. The patient has been followed up for one year with no evidence of recurrence . Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.
Introduction: An aneurysmal bone cyst are enigmatic lesionof unknown cause and presentation and are difficult todistinguish from other lesions, it is a benign, but expansibletumor like lesion that generally occurs in the long bones. Ananeurysmal bone cyst arising from the flat bone like clavicleis rare .Case presentation: We report a 12-year-old girl child with ananeurysmal bone cyst of the lateral third of left clavicletreated with enblock resection. The pathologic findingsconfirmed the diagnosis of aneurysmal bone cyst. Thepatient has been followed up for one year with no evidenceof recurrence .Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.
This study aims to design unified electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed the acceptable limit of being absent, and by that we can replace the traditional way of using papers to count absence, with a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.
In order to achieve the study's objectives, we designed an information syst
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe promotion by its means lead a vital and important role at the level of all organizations, whether (industrial or service) in general, and financial markets in particular. The promotion is earns delved to be as one of the main operations which market uses it through various means of financial markets and companies which its shares listed in the aim of (finance or investment), with a view to the implementation and financing of public and private projects the one hand, or with a view to achieving profits through investment of speculative or... For other purposes, on the other hand.Accordingly, we find that the set of public and private goals joint between the financial markets and listed companies respectively, will serve the stra
... Show More