Background: Laparoscopic sleeve gastrectomy has gained more popularity as an independent bariatric procedure because laparoscopic sleeve gastrectomy was reported to be an effective, safe, and time-savingprocedure, leading to adequate weight loss for morbidly obese patients and becoming one of the most common procedures performed for the treatment of morbidly obese patients in the last few years until now.
Objectives: The aim of this study is to compare two different techniques of the reinforcement of staple line during LSG in the reduction of major complications (bleeding and leak).
Patients and methods: prospective randomized study of a consecutive series of 126 patients that underwent LSG between April 2014 till August 2015. Patients were randomly enrolled in two different techniques of reinforcing the staple line during LSG, Group A consisted of 63 patients that underwent sleeve gastrectomy using Ethicon Endo GIA stapleTM with staple line oversewn using 2.0 prolene continuous suture, group B also 63 patients who had the staple-line oversewn with a continuous suture using V-locTM and Covidien Endo GIA tristapleTM.
Results: 126 patients who underwent LSG, 82(65%) were women and 44(35%) were men. Median age was 36 years (range, 19–58 years) and median preoperative BMI was 45.4 kg/m2 (range, 37–62 kg/m2), Three patients (4.76%)from group (A) and 2 patients (3.17%)from group (B)developed primary hemorrhage (within the first 24 hours post operatively), overall bleeding rate in both groups was (3.96%), no leak in both groups and no mortality.
Conclusion: laparoscopic sleeve gastrectomy is a safe procedure as a sole weight reduction operation. The combination of meticulous surgical technique, reinforcement of the gastric staple line, lead to decrease the incidence of staple line leak whatever the suture material or stapler type used, but there is no significant decrease in the incidence of bleeding with staple line reinforcement.
Twenty nine core samples were taken from Ratawi 7 Oil well according to the presence of oil in formation and availability of core samples. This well is located in the province of Basra/southern Iraq. The samples were collected from Yamama Formation. The core samples are taken from the well at different depths, ranging between (3663m-3676m). The range of Vp for these core samples is (668-4017 m/sec) and its average is (1779 m/sec), While the range of Vs is (291-1854 m/sec) and its average is (796 m/sec). In the current study the ultrasonic method is conducted to measure Vp, Vs as well as some petrophysical properties for core samples and some elastic moduli such as (Young's modulus, Bulk modulus, Shear modulus, Poisson's ratio and Lame's
... Show MoreThe objective of the research is to identify the efficiency of risk management in various names at Baghdad International Airport in the face of various risks (financial - technical - human - natural ..) facing the sample of the search of the General Establishment of Civil Aviation and the Iraqi Airways Company where the researcher identified the hypothesis that summarizes There is a significant significant correlation between risk management, risk management and risk review and assessment. The researcher used the means of research from observation and interviews with the relevant officials in this field, as well as used the questionnaire and distributed a sample of 170 employees in the field of risk management (SMS Department) in Iraqi A
... Show MoreVirtual reality, VR, offers many benefits to technical education, including the delivery of information through multiple active channels, the addressing of different learning styles, and experiential-based learning. This paper presents work performed by the authors to apply VR to engineering education, in three broad project areas: virtual robotic learning, virtual mechatronics laboratory, and a virtual manufacturing platform. The first area provides guided exploration of domains otherwise inaccessible, such as the robotic cell components, robotic kinematics and work envelope. The second promotes mechatronics learning and guidance for new mechatronics engineers when dealing with robots in a safe and interactive manner. And the thir
... Show MoreThis paper discusses the study of computer Russian language neologisms. Problems of studying computer terminology are constantly aggravated by the processes of computer technology that is introduced to all walks of life. The study identifies ways of word formation: the origin of the computer terms and the possibility of their usage in Russian language. The Internet is considered a worldwide tool of communication used extensively by students, housewives and professionals as well The Internet is a heterogeneous environment consisting of various hardware and software configurations that need to be configured to support the languages used. The development of Internet content and services is essential for expanding Internet usage. Some of the
... Show MoreGroundwater can be assessed by studying water wells. This study was conducted in Al-Wafa District, Anbar Governorate, Iraq. The water samples were collected from 24 different wells in the study area, in January 2021. A laboratory examination of the samples was conducted. Geographical information systems technique was relied on to determine the values of polluting elements in the wells. The chemical elements that were measured were [cadmium, lead, cobalt and chromium]. The output of this research were planned to be spatial maps that show the distribution of the elements with respect to their concentrations. The results show a variation in the heavy elements concentrations at the studied area groundwater. The samples show different values
... Show MoreIn this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreThis paper deals with an analytical study of the flow of an incompressible generalized Burgers’ fluid (GBF) in an annular pipe. We discussed in this problem the flow induced by an impulsive pressure gradient and compare the results with flow due to a constant pressure gradient. Analytic solutions for velocity is earned by using discrete Laplace transform (DLT) of the sequential fractional derivatives (FD) and finite Hankel transform (FHT). The influences of different parameters are analyzed on a velocity distribution characteristics and a comparison between two cases is also presented, and discussed in details. Eventually, the figures are plotted to exhibit these effects.
Abstract: Iatrogenic furcal root perforations are serious complications during dental treatment. This study was aimed to compare the sealing ability of new bioceramic root repair material TotalFill® with the other perforation repair materials (GIC, MTA and Biodentine) using a dye- extraction method.Materials and Methods: Forty extracted, human mandibular molars with non-fused well developed root were collected. Artificial perforations were made from the external surface of the teeth. Then the teeth were randomly divided into 4 experimental groups (n= 10) according to the type of repair material used in this study; Medifil glass ionomercement, TotalFill® bioceramic root repair material, BiodentineTM and MTA Plus. The specimens were then im
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs