Preferred Language
Articles
/
jkmc-12
Microfracture Arthroscopy Efficacy In Treatment Of Articular Cartilage Insult Of Knee
...Show More Authors

Background: The treatment of articular cartilage defects is one of the most clinical challeng for orthopedic surgeons. Articular cartilage is a highly organized tissue with complex biomechanical properties and substantial durability. However, it has a poor ability for healing, and damage from trauma or degeneration can result in morbidity and functional impairment. debilitating joint pain, dysfunction, and degenerative arthritis                                                                           Objectives: The purpose of study is to show effectiveness of micro fracture arthroscopy as a method of treatment for such problem .

Type of the study: Cross-sectional study.                     Methods: Arthroscopic surgery was done to 52 patients who complain of knee pain limping and show clinical or radiological evidence of cartilaginous injury and we used arthroscopic micro fracture technique for those patient who have injury of no more than4cm2 then we instruct patient to not put any weight over knee  for 2-3 months and followed clinically according to Lyshlom scor and by MRI and some of them by second look arthroscopy to assess the healing.

Results: Fifty two patients under go micro fracture arthroscopy . Thirty four patients (65.4%) reported good or excellent subjective results  , thirteen patients (25%) had fair knee function, and only five patients  (9.6%) reported poor result

Conclusions: Micro fracture arthroscopy is a   cheap effective method for repairing cartilaginous lesion .                                            

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Estimation the blast wave pressure effecters by apply Remote Sensing (RS) and Geographic Information System (GIS) techniques
...Show More Authors

After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 21 2022
Journal Name
International Journal Of Research In Social Sciences And Humanities
Managing Trading Decisions Using The True Strength Index –An Applied Study
...Show More Authors

The purpose of this research is to test the ability of the true strength index To time and manage trading in the financial market to select the best stocks and achieve a higher return than the Simple buy and hold strategy. And To achieve the objectives of the research, it relied on the main hypothesis, which is By using the True Strength Index to manage trading decisions buying and selling, can be achieved higher returns than the buy and hold strategy . The research community has been identified with all stocks listed on the Iraq Stock Exchange. Implementing the financial research tests requires selecting a sample from the research community that fulfills the test requirements according to a number of conditions So (38) companies we

... Show More
View Publication
Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Lorenz model and chaos masking /addition technique
...Show More Authors

View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Engineering
A Comprehensive Review for Integrating Petrophysical Properties, Rock Typing, and Geological Modeling for Enhanced Reservoir Characterization
...Show More Authors

Reservoir characterization is an important component of hydrocarbon exploration and production, which requires the integration of different disciplines for accurate subsurface modeling. This comprehensive research paper delves into the complex interplay of rock materials, rock formation techniques, and geological modeling techniques for improving reservoir quality. The research plays an important role dominated by petrophysical factors such as porosity, shale volume, water content, and permeability—as important indicators of reservoir properties, fluid behavior, and hydrocarbon potential. It examines various rock cataloging techniques, focusing on rock aggregation techniques and self-organizing maps (SOMs) to identify specific and

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Does the tertiary health care for Type 2 diabetic patients can help to Meet the recommended glycemic targets
...Show More Authors

Objectives: To study the effect of providing tertiary (specialized) health care for type 2 diabetic patients to meet the WHO and ADA standards and glycemic targets.
Method: Six months, Jan. – Jun. 2010, cohort study was conducted on 600 adult diabetics who registered in the National Diabetes Center (NDC) / Al-Mustansiriya University, Baghdad – Iraq. They were followed for 3- 6 months; each time patients were examined physically and their blood pressure, height, weight and BMI were measured. Fasting blood samples were taken from all patients to test the FPG, HbA1c, T.Chol, TG, HDL and LDL.
Results: Patients’ age was 52.85±15.56 year and the male/female ratio was 1.01, the median duration of disease was 7 years and their BMI w

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Modeling and Simulating NOMA Performance for Next Generations
...Show More Authors

Non-orthogonal Multiple Access (NOMA) is a multiple-access technique allowing multiusers to share the same communication resources, increasing spectral efficiency and throughput. NOMA has been shown to provide significant performance gains over orthogonal multiple access (OMA) regarding spectral efficiency and throughput. In this paper, two scenarios of NOMA are analyzed and simulated, involving two users and multiple users (four users) to evaluate NOMA's performance. The simulated results indicate that the achievable sum rate for the two users’ scenarios is 16.7 (bps/Hz), while for the multi-users scenario is 20.69 (bps/Hz) at transmitted power of 25 dBm. The BER for two users’ scenarios is 0.004202 and 0.001564 for

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref