We present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.
PDBN Rashid, Multidisciplinary International Journal, 2023
Water represents as a basic intellectual material in the myths of creation and the start of formation, Thus, water has turned into an intellectual material in literary mythological texts in addition to its function in sculptural Mesopotamian sculpture. The research is in three sections: the first section deals with Myth, its concept, peculiarities and types, the second section is about mythological literature, the third section is about the idea of water and mythical literature. The question research question here is that does the idea of water have any impact on mythological literature? And Does it link to sculptural products? The importance of the research is that it shows the human imagination and its relationship to functioni
... Show MoreObjective: To compare distal tibia nonunion plating and grafting with and without platelet-rich plasma (PRP) regarding union rate, union time and complications Conclusion: Combining PRP with autologous bone graft results in a higher union rate, less healing duration, less post-operative pain, and more callus formation. (Rawal Med J 202;45:629- 632). Methodology: In this prospective comparative study, 32 patients with nonunion tibia from July 2017 January 2019 were divided into two groups: group A (16 cases) were treated by plating and grafting with PRP and group B (16 cases) were treated by plating and grafting only. Keywords: Tibial nonunion, bone graft, plateletrich plasma. Results: There was higher union rate in group A related to group
... Show MoreCorona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m
... Show MoreDrought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThe Gender study is consider one of the concepts which the Postmodernism reached
after the end of Modernism, where the first one has limited the criticism study choices before
the second after closed many doors of subjects which was enriched by researches.
It is pretty clear that the root of this concept belongs to the Linguistics which provided
the Criticism with a countable reasons of it is growth.
The attention in the study of gender in Feminine Literature and Criticism increased in
Arabic studies since the early years of twenty one century, so this research is presented to be
an introduction to this subject which could pave the way to more studies.
In addition to the Gender studies this research deals with ano