Avascular necrosis have always presented great challenges to orthopedic surgeons and patients, remain in many ways today the unsolved dilemma. Varieties of non-vascularized bone grafting techniques preceded by core decompression have been proposed with varying degrees of success. O bb j ee cc t i vv ee ss : The aim of this study is to review the the value of core decompression and non-vascularized tibial bone strip graft treatment for early stages of non-traumatic osteonecrosis stage II & III according to stein burg staging . M ee t hh oo dd ss : prospectively reviewed 26 patients (32 hips) with osteonecrosis of the femoral head between June 2006 and December 2013 at Imam Ali hospital in Sader city & Al-Wasity teaching hospital. Inclusion criteria were all patients ages 19 years to 50 years and in Stein burg stages II and III . Mean follow-up for 3 year. Exclusion criteria were stage I, IV, V and VI .We used Phemister technique to make a window at the posterior aspect of greater trochanter to remove necrotic bone and packed the excavated area with cortico-cancelloustibial bone strip graft. This study was taking into account ethical evaluation and approval by scientific committee of Arab board. R ee ss uu l t ss: The reported results of treatment for femoral head avascular necrosis was (87.6%) success rate of hips in our cohort of patients with core decompression &non-vascularized tibial bone strip C oo nn cc l uu ss i oo nn ss : None vascularized tibial bone graft effectively reduce donor site morbidity and may defer jointarthroplasty in selected patient stein burg staging
A bolted–welded hybrid demountable shear connector for use in deconstructable steel–concrete composite buildings and bridges was proposed. The hybrid connector consisted of a partially threaded stud, which was welded on the flange of a steel section, and a machined steel tube with compatible geometry, which was bolted on the stud. Four standard pushout tests according to Eurocode 4 were carried out to assess the shear performance of the hybrid connector. The experimental results show that the initial stiffness, shear resistance, and slip capacity of the proposed connector were higher than those of traditional welded studs. The hybrid connector was a ductile connector, according to Eurocode 4, with slip capacity higher than 6 mm. A nonli
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreOrthodontic wires facilitate the required dental adjustments in the context of orthodontic therapy. The archwire has played a crucial role in orthodontic treatment, and the increasing emphasis on aesthetic preferences from patients, as well as the development of composite and ceramic brackets, have prompted investigations into aesthetic archwires that complement these brackets. Orthodontic wires are produced using a diverse range of materials. The utilisation of all available wire types can improve patient comfort, decrease chairside time, and shorten the overall duration of treatment. The individual clinician must possess comprehensive knowledge and comprehension of the various requirements and alternatives throughout the therapeut
... Show MoreAbstract The study aimed at demonstrating the reality of sectarian coexistence in Iraq, which was characterized by the tolerance and coercion caused by the successive government policies to govern Iraq and to this day. The study was based on the hypothesis that coexistence between Islamic sects in Iraq can be achieved as long as there are strong bonds linking its components, and these bonds can produce coexistence between the sects based on peace. The study concluded that the hypothesis is correct, in addition to drawing a set of observations aimed at identifying weaknesses for advancing them through the adoption of mechanisms that address these weaknesses to yield towards a genuine peaceful coexistence among Islamic sects in Iraq.
Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni
... Show MoreConcerns about the environment, the cost of energy, and safety mean that low-energy cold-mix asphalt materials are very interesting as a potential replacement for present-day hot mix asphalt. The main disadvantage of cold bituminous emulsion mixtures is their poor early life strength, meaning they require a long time to achieve mature strength. This research work aims to study the protentional utilization of waste and by-product materials as a filler in cold emulsion mixtures with mechanical properties comparable to those of traditional hot mix asphalt. Accordingly, cold mix asphalt was prepared to utilize paper sludge ash (PSA) and cement kiln dust (CKD) as a substitution for conventional mineral filler with percentages ranging fro
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreBackground: Selenium-73 with half- life of 7.15 hour emits β+ in nature and has six stable isotopes which are ( 74Se,76Se,77Se,78Se,80Se and 82Se ). Selenium-73 has many applications in technology and radioselenium compounds of metallic have found various applications in medicine. Objective: To make a comparison between different reactions that produced cross sections of Se-73 radioisotopes. Subjects and methods: The feasibility of the production of Selenium -73 via various nuclear reactions was investigated. Excitation functions of 73Se production by the reactions of 75As (p,3n), 169Tm( d,x), 74Se, natSe, natBr (p,x) , 75As (d,4n), natGe (3He,x), 70Ge (α, n), and 72Ge (α, 3n) and neutron capture were calculated using the avail
... Show Morestructural and electrical of CuIn (Sex Te1-x)2