Background: Humeral diaphyseal fracture usually
heals with closed methods but when nonunion
develops then it needs surgical intervention in the
form of plating and bone grafting, intramedulary
nailing (open or closed simple or interlocking nails)
and external fixators (circular or one plane fixator).
In our unit we treated non union humeral
diaphyseal fracture with plating and bone grafting
shortening of fracture ends up to 4 to 5cm when
needed. Methods: This study was conducted at
Orthopaedic Department of AL-Sadar General
Hospital from January 2004 till December2005 .
We included 20 cases with atrophic non-union in
12(60%) and hypertrophic non-union in 8 (40%)
patients. All atrophic non-union were treated with
plating, bone shortening by transverse osteotomy
and bone grafting, while hypertrophic non-union
were treated with decortications of non-union ends
and fixation with compression plates, with bone
grafting in old age. Follow up measures were based
on clinical (range of joints motion) and radiological
(healing) findings. Follow up was done for upto 6
months . Results: Out of 20 patients the age range
was 20- 60 years, 16 (80%)were male and 4(20%)
female. Right humerus involved in 15( 75 %)
while left humerus in 5( 25%) patients.
In12(60%) patients with atrophic non union bone
shortening by transverse cut osteotomy was done
while in remaining patients with hypertrophic nonunion
plating was done in 2( 10 %) cases and
plating with bone grafting in 6( 30%) patients.
Union was achieved in all patients after 16 to 20
weeks of surgery. In one patient ( 5 %) of 75 years
age with hypertrophic non-union implant was
loosened after 3 months of surgery. At that time
healing (Union) was evident on X-rays and humeral
brace was applied for further 3 months. Two
patients( 10 %) got neuropraxia of radial nerve
which resolved with in 3 months time. 2 patients
(10 %) developed shoulder stiffness which resolved
after exercise. Conclusion: In Non Union of
Humerus shortening by transverse osteotomy &
rigid fixation with plates give excellent results in
selected cases.
The relationship between blood group antigens and peptic ulcer disease has been widely evaluated in the past, but only one study relating H pylori seroprevalence to ABO blood groups among Iraqi patients with peptic ulcer disease is available. We aimed to evaluate the frequency of peptic ulcer disease among different ABO blood groups in Iraqi patients, and we thought it was worthwhile to try to determine whether these components take some part in disease etiology. One hundred and six patients with peptic ulcer disease (PUD) (43 male and 63 female; mean age: 48 ± 18 years) who attended Baghdad teaching hospital and Al- Yarmouk teaching hospital endoscopy centers were enrolled , and 238 control Subjects. Fing
... Show MoreCR-39 is a solid state nuclear track detector (SSNTD) that has been used in many research areas. In spite of the assumption that the CR-39 detectors are insensitive to beta and gamma rays, irradiation with these rays can have significant effects on the detector properties. In this study, beta and gamma rays mass attenuation coefficients μ/ρ (cm2 g-1) for the CR-39 detector have been measured using NaI(Tl) scintillation spectrometer along with a standard geometrical arrangement in the energy region of (0.546-2.274) MeV beta rays and standard gamma sources having energy 0.356, 0.5697, 0.6617 and 1.063 MeV. The total atomic cross-section (σtot), total electronic cross-section (σT E) and the effective atomic number (Zeff) of gamma rays a
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreAn experimental and theoretical works were carried out to model the wire condenser in the domestic refrigerator by calculating the heat transfer coefficient and pressure drop and finding the optimum performance. The two methods were used for calculation, zone method, and an integral method. The work was conducted by using two wire condensers with equal length but different in tube diameters, two refrigerants, R-134a and R-600a, and two different compressors matching the refrigerant type. In the experimental work, the optimum charge was found for the refrigerator according to ASHRAE recommendation. Then, the tests were done at 32˚C ambient temperature in a closed room with dimension (2m*2m*3m). The results showed that th
... Show MoreCopper (Cu) is an essential trace element for the efficient functioning of living organisms. Cu can enter the body in different ways, and when it surpasses the range of biological tolerance, it can have negative consequences. The use of different nanoparticles, especially metal oxide nanoparticles, is increasingly being expanded in the fields of industry and biomedical materials. However, the impact of these nanoparticles on human health is still not completely elucidated. This comparative study was conducted to evaluate the impacts of copper oxide nanoparticles (CuO NPs) and copper sulphate (CuSO4 0.5 (H2O)) on infertility and reproductive function in male albino mice BALB/c. Body weight, the weight of male reproductive organs, mal
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreBackground The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show More