Background: Injuries to blood vessels are among the most dramatic challenges facing trauma surgeons because repair is often urgent, the surgeon has to decide between management options (open or endovascular), and gaining control and reconstructing a major arterial injury can be technically demanding .
Objective:,To analyze the cause of injury, surgical approach, outcome and complications of axillary artery injuries.
Methods A descriptive cross-sectional study on fifty patients at Ibn-Alnafees hospital in Baghdad from January 2005 to December 2010
Results Males were more commonly affected than female with ratio of 6.1:1. Most injuries were caused by bullet and shell (84%), followed by stab wounds (10%) and blunt trauma (6%). Patients were divided into three groups according to the involved part of the axillary artery: the first part, the second part and the third part. The second part represents most of the cases (48%), the third part account for (30%), while the least is the first part (22%). Resection and end to end anastomosis was done in 80% of the cases, lateral repair in 8%, graft interposition in 8 % and ligation in 4%.
Conclusion: The outcome of the injury in this study was in general good. The morbidity of the patients due to nerve injury and wound infection still problem. Mortality due to associated injury and delayed presentation was 4% which is acceptable as compared with other studies.
Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show More
This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.
It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<
... Show MoreThe performance of a solar assisted desiccant cooling system for a meeting-hall located in the College of Engineering/University of Baghdad was evaluated theoretically. The system was composed of four components; a solar air heater, a desiccant dehumidifier, a heat exchanger and an evaporative cooler. A computer simulation was developed by using MATLAB to assess the effect of various design and operating conditions on the performance of the system and its components. The actual weather data on recommended days were used to assess the load variation and the system performance during those days. The radiant time series method (RTS) was used to evaluate the hourly variation of the cooling load. Four operation modes were employed for perform
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreThe radio drama is considered to be one of the arts that is discovered after a long period of theater's discovery. Initially , it was the broad framework of the theater's work when radio was broadcasting the shows on the huge theaters. This beginning encouraged many of the radio specialists to correlate plays with radio and make a novice and distinctive type of art. Thus, radio drama made its first step including the following ( plays, short and long series drama as well as other types of radio arts). Because of the above mentioned , the researcher is stimulating to study directing techniques to process the radio drama script ( Khata'a play as a sample).
The first chapter deals with the
... Show MoreTo investigate the efficacy of polyether‐ether‐ketone (PEEK) wire as a fixed orthodontic retainer, by comparing its performance to other retainer wires and optimizing its adhesion to composite bonding materials.
Retainer wires of 15 mm segments were used, PEEK wires were prepared in cylindrical form with 0.8 mm diameter, and had two surface treatments namely air‐abrasion and conditioning with adhesive system. Three different metallic retainer wires were used for comparison and three tests were performed; two tests measured debonding force and associated wire deflec
Background: Increasing interest in quality of life (QoL) is the new approach for understanding and improvement of health care. Although there are many studies about quality of life, there is deficiency of data about quality of life of peoples survived from terroristic explosions.Objectives: To study the QoL for peoples survived from terroristic explosions and compare it with that of a controlled people. Methods: This study was conducted between, 1st of July till 31st of December 2013. The sample of this study was collected from peoples attending the outpatient clinics in four primary health care centers, Baghdad city (2 from Rusafa and 2 from Karkh). 183 individuals proved to be exposed to terroristic explosion and 199 individual not exp
... Show More