Background: Fractures of the humeral shaft
accounting for approximately 3% of all
fractures. There is a wide array of good
options for their treatment and controversy
over the best methods. Although good
techniques of osteosynthesis are available, the
aim of this article is toemphasize on the benefit
and good outcome of conservative treatment
for properly selected cases to decrease the cost
and avoid the complications of surgery.
Discrete Raman amplifier have many attractive aspects over rare-earth doped fiber amplifier such as (EDFA) including arbitrary gain band, better adjustability of gain shape, and better linearity. This paper shows that discrete Raman amplifier has higher gain in bidirectional pumping than counter pumping. The gain increases with increasing fiber length, and the noise figure remain at the same value for short fiber length.
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreThe study includes the epipelic algae in Hemren reservoir, for the period between Januarys to October 2000 .The samples were collected from three selected sites at north, middle and south of reservoir. A total of 96 taxa of epipelic algae were identified. The diatoms were the dominated by 82 taxa represented 85.4% of the total identified species, followed by blue-green algae (cyanophyta) of 6.3 taxa (6%), and then green algae (chlorophyta) of 5.2 taxa (5%). One species was recorded for each crysophyta, euglenophyta and pyrrophyta. The seasonal variation for the cell density showed two peaks during spring and autumn seasons. Few species were dominated during the most studied period such as Achnanthes minutissima, Navicula cryptocephala
... Show MoreThe Khabour reservoir, Ordovician, Lower Paleozoic, Akkas gas field which is considered one of the main sandstone reservoirs in the west of Iraq. Researchers face difficulties in recognizing sandstone reservoirs since they are virtually always tight and heterogeneous. This paper is associated with the geological modeling of a gas-bearing reservoir that containing condensate appears while production when bottom hole pressure declines below the dew point. By defining the lithology and evaluating the petrophysical parameters of this complicated reservoir, a geological model for the reservoir is being built by using CMG BUILDER software (GEM tool) to create a static model. The petrophysical properties of a reservoir were computed using
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreBackground: Humeral diaphyseal fracture usually
heals with closed methods but when nonunion
develops then it needs surgical intervention in the
form of plating and bone grafting, intramedulary
nailing (open or closed simple or interlocking nails)
and external fixators (circular or one plane fixator).
In our unit we treated non union humeral
diaphyseal fracture with plating and bone grafting
shortening of fracture ends up to 4 to 5cm when
needed. Methods: This study was conducted at
Orthopaedic Department of AL-Sadar General
Hospital from January 2004 till December2005 .
We included 20 cases with atrophic non-union in
12(60%) and hypertrophic non-union in 8 (40%)
patients. All atrophic non-union w