Joint diseases, such as osteoarthritis, induce pain and loss of mobility to millions of people around the world. Current clinical methods for the diagnosis of osteoarthritis include X-ray, magnetic resonance imaging, and arthroscopy. These methods may be insensitive to the earliest signs of osteoarthritis. This study investigates a new procedure that was developed and validated numerically for use in the evaluation of cartilage quality. This finite element model of the human articular cartilage could be helpful in providing insight into mechanisms of injury, effects of treatment, and the role of mechanical factors in degenerative
conditions, this three-dimensional finite element model is a useful tool for understanding of the stress distributions within articular cartilage in response to external loads and investigating both the prevention of injury and the pathological degeneration of the joints.
In this study, 21 models were analysed by using ANSYS workbench v12.1: four normal articular cartilage models (distal femur, patella, medial and lateral tibia). A redesign to the distal femur model was done to get osteoarthritis articular cartilage (simple and deep) seven models by making partial cut without affecting the subchondral bone, and full cut with part of the subchondral bone in different diameters. Finally a treatment done by replacing the defective parts with artificial articular cartilages with different types of treatment. The finite element analysis studied depending on a Von Mises criteria and total deformation in different activities. The results shows that Autologous Chondrocyte Implementation is the best treatment way and it is close by 87.50% to normal cartilage. This procedure can be used as a diagnostic procedure for osteoarthritic patients and to choose the best treatment options.
This work aims to provide a statistical analysis of metal removal during the Magnetic Abrasive Finishing process (MAF) and find out the mathematical model which describes the relationship between the process parameters and metal removal, also estimate the impact of the parameters on metal removal. In this study, the single point incremental forming was used to form the truncated cone made of low carbon steel (1008-AISI) based on the Z-level tool path. Then the finishing was accomplished using a magnetic abrasive process based on the Box-Behnken design of the experiment using Minitab 17 software was used to finish the surface of the formed truncated cone. The influences of different parameters (feed rate, machining step s
... Show MoreOral carcinoma is the 6th most common cancer in the world. MicroRNAs are small non-coding single stranded RNAs. They have been shown to be capable of altering mRNA expression; thus some are oncogenic or tumor suppressive in nature. The salivary microRNA-31 has been proposed as a sensitive marker for oral malignancy since it was abundant in saliva more than in plasma. A total of 55 whole saliva samples were collected from 35 cases diagnosed with OC their ages and gender matched with 20 healthy subjects. TaqManq RT-PCR was performed for RNA samples. Mean age was 52.23+13.73 years in cases (range:17-70 years) with male predominance represented 69%. Risk of smoking and alcoholism was highly significant. The median fold change of miR-31 was sign
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MoreCrime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreBackground: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 151
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw
... Show More