Avascular necrosis have always presented great challenges to orthopedic surgeons and patients, remain in many ways today the unsolved dilemma. Varieties of non-vascularized bone grafting techniques preceded by core decompression have been proposed with varying degrees of success. O bb j ee cc t i vv ee ss : The aim of this study is to review the the value of core decompression and non-vascularized tibial bone strip graft treatment for early stages of non-traumatic osteonecrosis stage II & III according to stein burg staging . M ee t hh oo dd ss : prospectively reviewed 26 patients (32 hips) with osteonecrosis of the femoral head between June 2006 and December 2013 at Imam Ali hospital in Sader city & Al-Wasity teaching hospital. Inclusion criteria were all patients ages 19 years to 50 years and in Stein burg stages II and III . Mean follow-up for 3 year. Exclusion criteria were stage I, IV, V and VI .We used Phemister technique to make a window at the posterior aspect of greater trochanter to remove necrotic bone and packed the excavated area with cortico-cancelloustibial bone strip graft. This study was taking into account ethical evaluation and approval by scientific committee of Arab board. R ee ss uu l t ss: The reported results of treatment for femoral head avascular necrosis was (87.6%) success rate of hips in our cohort of patients with core decompression &non-vascularized tibial bone strip C oo nn cc l uu ss i oo nn ss : None vascularized tibial bone graft effectively reduce donor site morbidity and may defer jointarthroplasty in selected patient stein burg staging
This study was conducted to assess the hydrocarbon degradation abilities of Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae, which isolated from diesel contaminated soil samples. Single strains and mixed bacterial consortia have been investigated their ability to degrade 1.0 % (v/v) of diesel oil in Bushnell- Haas medium as sole.carbon.and.energy.source. At temperature 30∘C, the individual.bacterial.isolates exhibited low growth and low degradation.than did the.mixed. bacterial.culture. After 28 days.of incubation the.combination.of four isolates degraded.an upper limit.of diesel 88.4%. This was. continued.by 85.1% by S. paucimobilis, 84 % by Pentoae sp., 79% by S.aureus, and
... Show MoreConcerns about the environment, the cost of energy, and safety mean that low-energy cold-mix asphalt materials are very interesting as a potential replacement for present-day hot mix asphalt. The main disadvantage of cold bituminous emulsion mixtures is their poor early life strength, meaning they require a long time to achieve mature strength. This research work aims to study the protentional utilization of waste and by-product materials as a filler in cold emulsion mixtures with mechanical properties comparable to those of traditional hot mix asphalt. Accordingly, cold mix asphalt was prepared to utilize paper sludge ash (PSA) and cement kiln dust (CKD) as a substitution for conventional mineral filler with percentages ranging fro
... Show MoreThe purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreApium graveolens has been utilized for a multitude of purposes due to its diverse pharmacological characteristics. On the other hand, little is known about how the fatty acids (saturated and unsaturated) terpenes and steroids found in Iraqi Apium graveolens affect the human cancer cells. The purpose of this study was to examine the effects of Iraqi Apium graveolens petroleum ether extract on the human prostate cancer cell line (PC3). Subsidiary extraction and phytochemical analysis by GC/MS were performed.The dry and fresh aerial parts (leaves and stem) of Apium graveolens were extracted using a Soxhlet device with 70 % ethanol, then fractionated with petroleum ether. Then Gas Chromatography System was used to identify the bioactive
... Show MoreThe rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex
... Show More