Background: To find an operation that can be effectively carried out in both adults and children, equally applicable in the elective as well as in the emergency situation and for the good – risk as well as the poor – risk patients. Done by expert and junior surgeons in a short time.
Patients and Methods: Twenty patients with portal hypertension and bleeding varices aged 9-45 years were treated with shunting procedures (group 1, n=10), or a modified Sugiura operation (group 2, n=10) in accordance with the following therapeutic protocol: after resuscitation and diagnostic endoscopy, an emergency modified Sugiura operation was carried out if bleeding could not be controlled over 24 hours. When bleeding could be controlled, the patients underwent full investigation and were then treated with either shunting procedure or with a modified Sugiura operation. The Fisher exact probability test was applied for statistical analysis.
Results: Patients were evaluated at 1-3 years. The rates for operative deaths, recurrent hemorrhage, encephalopathy, late deaths, and patient survival at 1-3 years were as follows: 30%, 10%, 40%, 10% and 60% for group 1; 10%, 0%, 0%, 10%, and 80% for group 2, respectively. Within 3 months after the modified Sugiura operation, varices disappeared in most of the patients and hypersplenism was relieved in all.
Conclusion: We conclude that the modified Sugiura operation is probably a reasonable treatment for variceal hemorrhage because it is effective in arresting hemorrhage and it’s recurrence, with no encephalopathy, and a good survival rate.
Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s
... Show MorePhysiological status and litter size can indeed have a significant impact on ewes' hematological parameters, which are essential indicators of their health. Therefore, this study examined the hematological profiles of ewes during pregnancy with single and twins in the Awassi ewes. The present study involved 232 ewes in good health and at sexual maturity. Among them, 123 ewes had single pregnancies, while 109 ewes had twin pregnancies. The age range of the ewes included in the study was between 3.5 and 4.5 years. Hematological tests were conducted on the sheep's blood samples promptly following collection. The findings demonstrated variations in hematological parameters among pregnant
... Show MoreIn this study, the plasma formed by the preparation of Se and Tin (Sn) using a Nd: YAG laser with a wavelength of 1064 nm in air, which was then studied using the technique of optical emission spectrum, was presented (OES).The laser-induced plasma parameters such an electron temperature (Te) were identified using two-ratio methods, using Stark broadening methods to determine the density of electrons (ne). According to the findings, there is a correlation between the amount of laser energy that is applied and the increase in the emission intensity of the spectral lines. In the case of Se plasma, an increase in laser energy causes a rise in the temperature of the electrons. While increasing the temperature of the elec
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe most important function of a prosthetic hand is their ability to perform tasks in a manner similar to a natural hand, so it is necessary to perform kinematic analysis to determine the performance and the ability of the prosthetic human finger design to work normally and smoothly when it's drive by two sets of links that embedded in its structure and pulled by a servomotor, so the Denvit-Hartenberg method was used to analyse the forward kinematics for the prosthetic finger joints to deduction the trajectory of the fingertip and the velocity of the joints was computed by using the Jacobian matrix. The prosthetic finger was modelled by the Solidwork - 2018 program and the results of kinematics were verified using MATLAB. The analys
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreIt is generally accepted that there are two spectrophotometric techniques for quantifying ceftazidime (CFT) in bulk medications and pharmaceutical formulations. The methods are described as simple, sensitive, selective, accurate and efficient techniques. The first method used an alkaline medium to convert ceftazidime to its diazonium salt, which is then combined with the 1-Naphthol (1-NPT) and 2-Naphthol (2-NPT) reagents. The azo dye that was produced brown and red in color with absorption intensities of ƛmax 585 and 545nm respectively. Beer's law was followed in terms of concentration ranging from (3-40) µg .ml-1 For (CFT-1-NPT) and (CFT-2-NPT), the detection limits were 1.0096 and 0.8017 µg.ml-1, respec
... Show MoreThis search reports the synthesis of some new series of Schiff base compounds for trimetheprim derivatives which known high been known as a medicinal effectiveness. Trimetheprim was condensed with several substituted aldehydes compounds.(4-dimethyl amine benzaldehyde , propanal , salicaldehyde, 2.4 dimethoxy benzaldehyde and 4- methyl benzaldehyde) to obtain Schiff base products(1a-5a) and several substituted ketones compound (4-aminoacetophenone,4-chloroacetophenone, isobutyleketone, acetylacetone and acetophenone) to obtain Schiff base products(6b-10b) in ethanol in the presence of concentrated sulphuric acid as a catalyst to yield the Schiff base. The structure of synthesized compounds has been established on the basis of their Chemical
... Show More