Joining tissue is a growing problem in surgery with the advancement of the technology and more precise and difficult surgeries are done. Tissue welding using laser is a promising technique that might help in more advancement of the surgical practice. Objectives: To study the ability of laser in joining tissues and the optimum parameters for yielding good welding of tissues. Methods: An in-vitro study, done at the Institute of Laser, Baghdad University during the period from October 2008 to February 2009. Diode and Nd-YAG lasers were applied, using different sessions, on sheep small intestine with or without solder to obtain welding of a 2-mm length full thickness incision. Different powers and energies were used to get maximum effect. Results: Welding of sheep intestine had been achieved by Nd-YAG laser 1064 nm at 400 and 500 mJ and PRR 4Hz, using human albumin 20% as a solder. Welding failed using the diode laser 4W for 10 min with albumin and indocyanine green. Conclusion: Laser may be useful tool in certain condition for joining tissue and wound closure. This is important because in certain circumstances no other technique is feasible for wound closure.
Antibiotic resistance is the capability of the strains to resist or protect themselves from the effects of an antibiotic. Such a resistance towards the current antimicrobials leads to the search of novel antimicrobials. Nanotechnology has been promising in different field of science and among it is the use of nanoparticles as antibacterial agents. The gastrointestinal tract seems to be the primary reservoir of uropathogenic E.coli (UPEC) in humans. UPEC strains harbour the urinary tract and cause urinary tract infection. They cause serious ailments in terms of humans. They develop resistance and increase their virulence by forming biofilms. They also show a remarkable locomotory movement with the aid of autoinducer controlled ge
... Show MoreNew series of metal ions complexes have been prepared from the new ligand [4-Amino-N-(5-methyl-isaxazol-3-yl)-benzenesulfonamide] derived from Sulfamethoxazole and 3-aminophenol. Accordingly, mono-nuclear Mn(II), Fe(III), Co (II), and Rh(III) complexes were prepared by the reaction of previous ligand with MnCl2.4H2O, CoCl2.6H2O, FeCl3.6H2O and RhCl3H2O, respectively. The compounds have been characterized by Fourier-transform infrared (FTIR), ultraviolet–visible (UV–vis), mass, 1H-, and 13C-nuclear magnetic resonance (NMR) spectra and thermo gravimetric analysis (TGA& DSC) curve, Bohr magnetic (B.M.), elemental microanal
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreElectro-kinetic remediation technology is one of the developing technologies that offer great promise for the cleanup of soils contaminated with heavy metals. A numerical model was formulated to simulate copper (Cu) transport under an electric field using one-dimensional diffusion-advection equations describing the contaminant transport driven by chemical and electrical gradients in soil during the electro-kinetic remediation as a function of time and space. This model included complex physicochemical factors affecting the transport phenomena, such as soil pH value, aqueous phase reaction, adsorption, and precipitation. One-dimensional finitedifference computer program successfully predicted meaningful values for soil pH profiles and Cu
... Show MoreAn experimental and theoretical works were carried out to model the wire condenser in the domestic refrigerator by calculating the heat transfer coefficient and pressure drop and finding the optimum performance. The two methods were used for calculation, zone method, and an integral method. The work was conducted by using two wire condensers with equal length but different in tube diameters, two refrigerants, R-134a and R-600a, and two different compressors matching the refrigerant type. In the experimental work, the optimum charge was found for the refrigerator according to ASHRAE recommendation. Then, the tests were done at 32˚C ambient temperature in a closed room with dimension (2m*2m*3m). The results showed that th
... Show MoreAnemia of chronic disease (ACD) and iron deficiency anemia (IDA) are the two most important types of anemia in rheumatoid arthritis (RA). Functional iron deficiency in ACD can be attributed to overexpression of the main iron regulatory hormone hepcidin leading to diversion of iron from the circulation into storage sites resulting in iron-restricted erythropoiesis. The aim is to investigate the role of circulating hepcidin and to uncover the frequency of IDA in RA. The study included 51 patients with RA. Complete blood counts, serum iron, total iron binding capacity, ferritin, and hepcidin- 25 were assessed. ACD was found in 37.3% of patients, IDA in 11.8%, and combined (ACD/IDA) in 17.6%. Serum hepcidin was higher in ACD than in con
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More