Background: Civil violence in Iraq has reached an epidemic level during the last few years, and an increasing number of urological injuries were faced in dealing with unprotected civilians who were exposed daily to violence in streets, at homes, and at work. Bladder injuries are an example of injuries which were faced rarely before but increasingly now, if not dealt with properly such injuries may end with serious morbidity and even crippling, on the other hand proper management will greatly decrease morbidity and mortality of such injuries.
Patients and method: over the period from March 2004 to June 2005 all the patients triaged to the emergency unit of Medical City with genitourinary trauma were included in the study, those with bladder injury discovered pre-operatively or per-operatively were involved in the study, for all patients the mechanism, grade, site, associated other organ injury, and outcome were defined. Data collected and statistically analyzed.
Results: The total number of patients sustained genitourinary tract injuries was 197, only 73 (37%) of them had bladder injuries, the majority were males (87.6%) in their active life (67% aged 20-40 years). Most of the injuries were caused by bullets (50.6%) and shells (25.3%), were sever (82.1% had grades III and IV), and affecting the dome of the bladder (39.7%). The gastrointestinal tract was the commonest system to be injured in association with the bladder (87.6%), but the mortality rate was associated only with affection of chest, head, and vascular systems. The over all mortality rate was 9.5% and the morbidity rate was 12.3%.
Conclusion: the incidence of bladder injury in urological trauma is high in civilian casualties because of lack of protection, they are usually severe and of high grade, and associated with other organ injuries. Bullets are the main causative factor, and the dome is the mostly affected site. The mortality rate is low (9.2%) and is related to the associated organ injury, but not related to the severity of injury. We need to continuously evaluate our experience in trauma management, and to establish specialized trauma centers to cope with the increasing number of civilian victims.
The lack of active 2019 coronavirus disease (COVID-19) pandemic treatment creates a challenge for researchers and scientists to find the most appropriate treatment for this disease. Dexamethasone, according to the findings of the RECOVERY clinical trial, declared mid-June 2020 in print media was one of those therapies. Although the results from retrospective studies are not strongly supportive of corticosteroid routine use in COVID-19 despite the signals for some benefits, the dedicated RECOVERY trial found a significant reduction in death with dexamethasone only in severe cases on a ventilator or moderate cases on supplemental oxygen therapy nevertheless, no benefit observed in mild to moderate cases requiring no oxygen. More studi
... Show MoreInfrastructure projects take a long time, are complex, multidisciplinary, use different materials and products, and have high risk. These characteristics affect the process of supplying materials. The current paper studies the ability to improve the supply chain process and decrease its cost by identifying the factors that affect it. These factors are used as variables in the mathematical model, which is working under uncertain conditions when the consumption rate of materials is not constant. The information used in this model is obtained from Building Information Modeling (BIM) and Geographical Information System (GIS) techniques and the genetic algorithm is utilized to determine the optimal supplier and the quantities of supplies
... Show MoreGlobal virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreA session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More