Background: Unintended durotomy is an infrequent but well-recognized Complication during degenerative lumbar spine surgery. The current literatures report a wide variation in incidence of durotomy during degenerative lumbar spine surgery.
Objective: To assess the incidence, treatment, clinical consequence, complications of unintended durotomy during degenerative lumbar spine surgery, and the results of 2-24 months clinical follow-up.
Patients and Methods: A prospective study was conducted on 264 patients who underwent degenerative lumbar spine surgery performed in Al-Sheikh Zayed Hospital and private nursing home hospital- medical city in Baghdad from January 2011 to June 2012. Patients managed by spine fixation were excluded from this study.
Results: The incidence of unintended durotomy during spine surgery was 8.33% (22 of 264 cases). The incidence varies according to the type of surgery being performed (6.66% in primary discectomy, 12.5% in decompressive laminectomy and 21.73% in revision surgery). Unintended durotomy was more common in revision surgery compared with primary surgery (21.73% vs 7.05%; p < .001), and it was significantly more common among elderly patients (17.39% in patients > 60 years old; p = .006). Most of the durotomies were managed by primary repair. A mean follow-up of 6 months showed good long-term clinical results.
Conclusions: All unintended durotomies must be repaired primarily. Durotomies that were immediately recognized and treated did not lead to any significant sequelae at a mean follow-up of 6 months.
Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreThe research aims to identify the availability of some basic competencies that are required to be available to workers in digital agricultural Extension from the point of view of senior management, middle management, and, employees with Post-graduate education degrees, represented by the following: Transition to digital agricultural Extension for sustainable and smart family farms, benefiting from international expertise and experiences in applying for Digital agricultural Extension, preparing and implementing Extension messages through platforms, factors affecting the effectiveness of digital agricultural Extension and its platforms, following up and evaluating the activities and programs of the digital Extension platform. The research pop
... Show MoreThe main objective of this study is to determine the suitable excitation wavelengths for
urine components reaching to select the suitable lasers to execute the auto fluorescence due to their
high intensities. The auto fluorescence was measured at 305, 325 and 350 nm excitation wavelengths
for eleven urine samples which were also analyzed by conventional methods (chemical and
microscopic examination). Data manipulation using Matlab package programming language showed
that urine sample with normal chemical and biological components have emission peaks which are
different from the infected urine samples. Despite the complexity of the composition of urine,
fluorescence maxima can be observed. Most likely, the peaks obser
The main objective of this study is to determine the suitable excitation wavelengths for
urine components reaching to select the suitable lasers to execute the auto fluorescence due to their
high intensities. The auto fluorescence was measured at 305, 325 and 350 nm excitation wavelengths
for eleven urine samples which were also analyzed by conventional methods (chemical and
microscopic examination). Data manipulation using Matlab package programming language showed
that urine sample with normal chemical and biological components have emission peaks which are
different from the infected urine samples. Despite the complexity of the composition of urine,
fluorescence maxima can be observed. Most likely, the peaks obser
Jurisprudence is one of the most honorable sciences in value, and the greatest of them in reward. Through it, the rulings of religion are known. He, may God’s prayers and peace be upon him, said: ((Whoever God desires good, He gives him understanding of religion)), and through it, the legal rulings and what is related to them are known from what is permissible and forbidden.
And prayer is the believer’s ascent to his Lord, with which the heart is at peace and the soul is at ease. If he, may God’s prayers and peace be upon him, was overwhelmed by an issue or something became difficult for him, he would panic in prayer and be reassured by it. It was necessary for the students of knowledge to investigate its aspects and its secrets
Of non-Muslim minorities In the Muslim community
يعود الأرشيف إلى تورام ايلي التاجر والذي عرف في النصوص أيضا بوكيل التجار(ugula-dam-gàr)، في دوره هذا له سلطة بين التجار في مجتمعه(مجتمع التجار)، يذكر(Garfinkle) أن التجار غالبا ما اكتسبوا ألقابهم عن طريق الوراثة ذلك قد يمنح التجار حق الدخول إلى حسابات المؤسسات العامة. كان تورام ايلي تاجرا نشيطا في أعمال قروض الفضة في أواخر عهود سلالة أور الثالثة(3)، لمدة (ثمان عشرة) سنة أعتبارا من السنة الرابعة من حكم الملك أمارسن وحتى ا
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreEnergy crisis and the requirements of health and feel good, all this renewed attention to the importance of natural lighting in all kinds of factories.
Research problem was how to achieve the plant's own natural outlets visual comfort and satisfaction of workers in Companies, the industries of cotton and general al-fedaa.
The research compuns address the impact of daylight to provide visual comfort in the factory. Indeed, the light must be treated very carefully, and natural lighting should be thinking from the perspective of the occupants of the plant and not wishing to view from the outsid
... Show More