Background: The role of prophylactic antibiotics remains controversial. It is clear that actively facial fractures are considered as clean contaminated and should be treated with therapeutic antibiotics; however, there is widespread variability in the use, type, timing, and duration of prophylactic antibiotic administrated in practice today. There is an adverse effect of increased antibiotic resistance, as well as costs, it is important to review the current evidence for the role of prophylactic antibiotics in compound facial fractures. The purpose of this study is to evaluate the role and significance of preoperative, perioperative and postoperative antibiotic prophylaxis for patients when there is already an infective focus, such as compound facial fracture. Materials and methods: A total of 70 Iraqi patients aged 4-65 years, 50 males and 20 females who met the eligibility criteria were enrolled in this study to evaluate the infection rate in patients who have sustained compound facial fractures treated by open or closed treatment. The patients were divided into two groups, Group A included 50 patients who received pre, peri and post-operative antibiotics. Postoperatively the antibiotics utilized in two different regimen timing. In Group B antibiotics were administrated peri and post-operatively for 20 patients. They were then followed up to 4 weeks for any sign or evidence of infection such as pus discharge. Results: There was no significant association (p=0.664) between the incidence of post-operative infections and pre-operative administration of antibiotics. Significant association p.Value (0.032) between prevalence of postoperative infection and type of surgery. Conclusion: Perioperative prophylactic antibiotics have been proven to lower infection rates postoperatively. Open reduction presented with significant complication (infection) than closed reduction modality of treatment.
Background:Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective:We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study:Retrospective study.Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclageand tensi
... Show MoreBackground: Fractures of patella constitute 1% of all fractures. Various techniques have been described for internal fixation of patella fractures. Superiority of one technique over the other has long been debated. Objective: We reviewed a series of seventy patients with transverse or comminuted fractures of patella treated with cerclage and tension band wiring technique to assess if it had any advantages over k. wires and tension band wiring technique. Type of the study: Retrospective study. Methods; Seventy patients with displaced patella fracture, with a mean age of 47 years (range 13-75) were divided into two groups :group A 36 patients were treated with cerclage and tension bands technique ,and group B 34 patients were fixed by 2 K.
... Show MoreA theoretical study on corrosion inhibitors was done by quantum calculations includes semi-empirical PM3 and Density Functional Theory (DFT) methods based on B3LYP/6311++G (2d,2P). Benzimidazole derivative (oxo(4- ((phenylcarbamothioyl) carbamoyl)phenyl) ammonio) oxonium (4NBP) and thiourea derivative 2-((4- bromobenzyl)thio) -1H-benzo[d] imidazole (2SB) were used as corrosion inhibitors and an essential quantum chemical parameters correlated with inhibition efficiency, EHOMO (highest occupied molecular orbital energy) and ELUMO (lowest molecular orbital energy). Other parameters are also studied like energy gap [ΔE (HOMO-LUMO)], electron affinity (EA), hardness (Δ), dipole moment (μ), softness (S), ionization potential (IE), absolut
... Show MoreThe Nuclear structure of 110-116Cd isotopes was studied theoretically in the framework of the interacting boson model of IBM-l and IBM-2. The properties of the lowest mixed symmetry states such as the 1+, 2+ and 3+ levels produced by the IBM-2 model in the vibrational-limit U(5) of Cd - isotopes are studied in details. This analysis shows that the character of mixed symmetry of 2+ is shared between and states in 110-114Cd – isotopes, the large shar goes to s, while in isotope, the state is declared as a mixed symmetry state without sharing. This identification is confirmed by the percentage of F-spin contribution. The electromagnetic properties of E2 and Ml operators were investigated and the results were analyzed. Various
... Show MoreThe study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
The study included general survey of some districts of Iraq in order to determinate new distribution areas for 33 species of the genus salvia L. ,new collections obtained , new locations for many species recorded. Observed specimens in most Iraqi herbaria were studies and identified. ,the flowering period were also studied
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More
