Background: Laparoscopic cholecystectomy has many difficulties which include port Insertion, Dissectionof the Calot’s Triangle , Grasping of the Gallbladder , Wall thickness, Adhesion and extraction of theGallbladder. Aim of the Study: To predict how difficult cholecystectomy will be from assessing the patientpreoperatively which, in turn, help in decreasing the risks on the patients and preventing post-operativecomplications. Patients and Methods: A prospective study conducted in the department of General Surgeryat Al-Ramadi Teaching Hospital for the period of nine months from 15th of May 2018 till the 15th of February2019. It included 60 patients, all of them were undergone laparoscopic cholecystectomy for Gallstone. Patientswith common bile duct calculus, dilated common bile duct, current attack of acute cholecystitis, those withabsolute contraindications to laparoscopic cholecystectomy, The data were collected prospectively to predictthe significance of association with patients’ characteristics. The time of operation was calculated from thefirst port site incision until the last port closure. All the intra operative events were recorded. Conversionsto open cholecystectomy were done by median or subcostal laparotomy according to the surgeon’s decisionand each patient’s condition. Results: In this study, the highest proportion of operations was categorizedas easy (58.3%), 28.3% of operations were considered difficult and 13.3% of them were very difficult. Asignificant association (P < 0.05) between operation difficulty and all of the following characteristics: Aging,obesity, history of previous biliary hospitalization, thickened bladder wall, pericholecystic collection, andlarge stones. Conclusions: The difficult laparoscopic cholecystectomy can be predicted preoperativelybased on number of factors, like: obesity, previous biliary admission, gall bladder wall thickness, ultrasoundfindings (stone size and pericholecystic fluid) and aging process, evaluating of such factors minimize thecomplications of laparoscopic cholecystectomy and conversion to the open procedure.
Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over
... Show MoreThis study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne
... Show MoreLet be an n-Banach space, M be a nonempty closed convex subset of , and S:M→M be a mapping that belongs to the class mapping. The purpose of this paper is to study the stability and data dependence results of a Mann iteration scheme on n-Banach space
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreThe Sultanate of Oman is located in the far southwest of the Arabian Peninsula and enjoys a distinctive geographical location as it overlooks the Arabian Gulf and the Gulf of Oman. The Sultanate has good relations with various countries of the world and enjoys an important regional position. At the beginning of 2020, Sultan Qaboos bin Said died, and Haitham bin Tariq assumed power after him, according to the will of his cousin, the late Sultan. The new Sultan had held some important positions before 2020, including: Minister of Heritage and Culture since February 2002, Chairman of the Supreme Committee for the Future Vision (Oman 2040), Secretary-General of the Ministry of Foreign Affairs, Undersecretary of the Ministry of Foreign Affairs f
... Show MoreNano TiO2 thin films on glass substrates were prepared at a constant temperature of (373 K) and base vacuum (10-3 mbar), by pulsed laser deposition (PLD) using Nd:YAG laser at 1064 nm wavelength. The effects of different laser energies between (700-1000)mJ on the properties of TiO2 films was investigated. TiO2 thin films were characterized by X-ray diffraction (XRD) measurements have shown that the polycrystalline TiO2 prepared at laser energy 1000 mJ. Preparation also includes optical transmittance and absorption measurements as well as measuring the uniformity of the surface of these films. Optimum parameters have been identified for the growth of high-quality TiO2 films
... Show MoreThe theories and applications of speaker identification, recognition, and verification are among the well-established fields. Many publications and advances in the relevant products are still emerging. In this paper, research-related publications of the past 25 years (from 1996 to 2020) were studied and analysed. Our main focus was on speaker identification, speaker recognition, and speaker verification. The study was carried out using the Science Direct databases. Several references, such as review articles, research articles, encyclopaedia, book chapters, conference abstracts, and others, were categorized and investigated. Summary of these kinds of literature is presented in this paper, together with statistical analyses
... Show MoreThe present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.
The research team seeks to study the phenomena of random housing in Iraqi society in general and Baghdad city in particular by standing on the causes behind this phenomena and its relation with security situation in Baghdad. The researchers adopted a theoretical and practical framework. The main objective is to diagnose the risks caused by the escalation of slums in Baghdad city.
The ability of insurance companies to achieve goals depends on their ability to meet customers' requirements, and this requires them to identify target markets and respond to needs and wishes of the markets, the skill is to convince the company to operate what is in the interest of the customer if he is convinced the customer service provided to him, he would repeat to deal with, and where the cost of maintaining existing customers is less than the cost of attracting new customers, the insurance companies that is working hard to maintain their customers, the more customer satisfaction with the services provided has increased loyalty and weakened the ability of competitors lured.
&nbs
... Show More