Objectives: to evaluate the role of conservative, decompression, spine fixation in management of closed spinal injury.
Methods: The study was conducted at Specialized Surgical hospital and Al-Kadhemayia Teaching Hospital, in the period between July 2003 and July 2005.The study included 61 patients categorized Into many groups according level of vertebral injury (cervical, cervicodorsal, dorsal, dorsolumbar, Lumbar and lumbosacral), type of injury (compressed fracture, burst fracture and fracture dislocation) And according the severity into three groups as G1( complete motor paralysis and sensory loss ) G2 ( complete motor paralysis and incomplete sensory loss) and G3 ( incomplete motor paralysis And incomplete sensory loss ).The metho
The best design of subsurface trickle irrigation systems requires knowledge of water and salt distribution patterns around the emitters that match the root extraction and minimize water losses. The transient distribution of water and salt in a two-dimensional homogeneous Iraqi soil domain under subsurface trickle irrigation with different settings of an emitter is investigated numerically using 2D-HYDRUS software. Three types of Iraqi soil were selected. The effect of altering different values of water application rate and initial soil water content was investigated in the developed model. The coefficient of correlation (R2) and the root-mean-square error (RMSE) was used to validate the predicted numerical res
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreBackground: Restoration of root canal treated teeth with a permanent restoration affect in the success of endodontically treated teeth. This in vitro study was performed to evaluate and compare the fracture strength of endodontically treated teeth restored by using custom made zirconium posts and cores, prefabricated carbon fiber, glass fiber and zirconium ceramic posts. Materials and method: Forty intact human mandibular second premolars were collected for this study and were divided into five groups. Each group contains 8 specimens: Group1: Teeth restored with Carbon Fiber Posts; Group2: Teeth restored with Glass Fiber Posts; Group3: Teeth restored with Zirconium Ceramic prefabricated Posts; Group4: Teeth restored with Zirconium Posts
... Show MoreThis research dealt with the subject of negotiation skills of employees in public relations departments which is one of many skills supposed to be available to these employees. These skills combined help in the success of the job of public relations departments; and give them an important and vital role within the roles distributed in the departments of any government institution wither is governmental or non-governmental.
Negotiation is a skill that requires intelligence, tact, culture, information, intuition, and knowing to use the means of communication to access the information that is useful in reaching satisfactory results
... Show MoreThe research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show MoreThis study aims to identify the anxiety pregnant women have of dying, in the light of some Demographic variables in Bethlehem (age, residence, and the mother's job). The descriptive method was used in this study. To achieve the study purposes, the researchers developed a questionnaire as a tool of study, which consisted of (19) paragraphs ,after been verified of its validity & stability.
The researchers distributed questionnaires, and then analyzed them. Results illustrated that the levels of anxiety pregnant women in Bethlehem had of dying was average, with a mean total score of (3.11), and with a standard deviation that had the total score of (0.476). Results also illustrated statistical differences in the pregn
... Show MoreA novel series of liquid crystalline compounds containing 2,4-thiazolidinedione units with varying terminal alkyl chain lengths was successfully synthesized and characterized. The chemical structures of the synthesized compounds were confirmed by FT-IR, ¹H-NMR, and mass spectrometry. The mesomorphic behavior was investigated using polarized optical microscopy (POM) and differential scanning calorimetry (DSC). Compounds [V]₄, [V]₅, and [V]₆ exhibited enantiotropic nematic phases, while compound [V]₈ displayed a smectic A (SmA) phase. No liquid crystalline behavior was observed for compound [V]₃. The liquid crystalline properties were found to depend on the terminal-to-lateral chain length ratio, molecular geometry, and the nature
... Show More