Objective : Sciatic nerve block (popliteal approach) and femoral N block is a new technique other than general anesthesia in below knee surgery because it provides adequate muscle relaxation, with good intraoperative and post-operative analgesia. Nefopam is non opioid, non-respiratory depressant and non-sedative was mixed with local anesthetics drug to study the effects. This study was done to compare the onset and duration of sensory and onset time and duration of action of motor block following administration of either bupivacaine alone with administration of bupivacaine and Nefopam in patients undergoing below knee lower limb surgeries under ultrasound guided regional anesthesia.
Methods: 100 patients with American society of anesthesiologists (ASA) 2 / 3/4 patients between 25 and 85 years who underwent elective and emergency lower limb surgeries randomly allocated into two group, each group has 50 patients by a sealed envelope technique to receive 20 ml of 0.5% Bupivacaine with 2 ml of normal saline in Group BS and 20 ml of 0.5% Bupivacaine with 2ml (20mg) of Nefopam in the second group (Group BN). The onset time, duration time of both sensory and motor blocking were seen and compared between the two groups.
Results : The onset time of both sensory and motor blockade was shorter in Group BN (bupivacaine with nefopam) when compared to Group BS (bupivacaine and normal saline) (p<0.0001). The duration of both sensory and motor blockade was longer in Group BN when compared to Group BS (p<0.0001). There were no significant hemodynamic changes (PR, BP,SPO2) in both groups. Also there is no any side effect or any complication.
Conclusion Nefopam when mixed with Bupivacaine in Sciatic nerve block and femoral nerve block in below knee surgeries shortens the onset time and prolongs the duration of action of both sensory and motor blockade without any systemic side effects and give excellent intra and postoperative analgesia.
Back ground: Chronic total occlusion (CTO) of coronary arteries remains one of the most challenging lesion subsets in interventional cardiology even with the development of medical devices and operator expertise. Successful revascularization results in improved in angina status ,increased exercise capacity and reduces the need for lat CABG surgery .
Objectives: This study sought to determine the overall procedural success rate of percutaneous coronary intervention (PCI) for CTOs and to examine the relation between variables such as; patients’ characteristics, risk factors, lesion characteristics and procedural success rate.
Methods: In this study ,clinical and coronary angiography data of (80) patients with CTO who underwent PCI
Wires are commonly used for the construction of orthodontic appliances and occasionally as wrought clasps and rests on partial dentures. The corrosion resistance is the most important properties of dental alloy. Corrosion process reported to cause a numerous adverse effects on both living tissue and restoration .The conditions in the mouth are very suitable for the occurrence of corrosion. The main objective of this study was to evaluate the corrosion behavior of different gauges of stainless steel wire in artificial saliva .Four gauges of dental stainless steel wire used in orthodontic and removable partial denture were used in this study 0.6mm.,0.7mm.,0 .8mm.&1.0mm.
... Show MoreThe current research aims to know the complementary use of the paper book and the digital book by defining the paper book and the digital book and knowing the methods and methods of obtaining each of them and indicating the extent of their use and for what purpose and knowing the difficulties that researchers face in using each of them and which is better using the paper book or the digital book in preparing research Studies and for no reason. The research relied on the descriptive approach and the questionnaire as a tool for data collection, and it was distributed to professors and students of Iraqi universities. The research sample reached (219) individuals and reached a set of results, the most important of which are: Preference for the
... Show MoreBackground: Recurrent Aphthous Stomatitis (RAS) is the most common painful oral mucosal disease, affecting approximately 20% of the population. RAS presents with a wide spectrum of severity ranging from a minor nuisance to complete debility. Many of factors thought to have been involved in its etiology; that might have at the same time a direct or indirect impact upon oxidant/antioxidant system and trigger free radicals production. The aim of this study was to determine the possible association of oxidant/total antioxidant status and recurrent aphthous stomatitis (RAS). Subjects, materials and methods: The study consisted of thirty patients with recurrent aphthous stomatitis and thirty healthy controls from which saliva and blood samples we
... Show MoreIn this research, a number of the western al-Anbar clays (red iron clays, Attapulgite) were modified by treating them thermally with a temperature of 650oC. After that, these clays reflux with sodium hydroxide 5% for 1 hour by using microwave as a power supply. The research included fractionation alqayaira crude oil the fractionation included removing the asphaltene by precipitation from the crude using a simple paraffin solvent (normal hexane) as a non-soluble substance. After that it was filtered using the ash-free filter paper 42, the dissolved part, maltinate, was taken, drying a temperature of 75oC and weight, and to find the percentage of the two parts. Malatine was divided into three main parts (paraf
... Show MoreAbstraction showed a case of distinction between art schools, in which reality was reduced using overlapping artistic elements and techniques to reach the artist's self-realization when abstracting the reality, and searching for implicit implications for the content of the artistic painting.
Building a system of relations and formulations between abstracting the reality of the physical forms and employing the symbols and codes to convey a message to the recipient who interacts with what he watches through the processes of explanation, interpretation, and linking the particles and reveal the pure aesthetics for the artwork.
Thus the current research deals with the following chapters and sections: the methodological framewo
... Show MoreAbstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreKidney damage in workers within environments of highly expected exposure to toxin, including heavy metals, could be a primary marker to expect hazards in population exposed to low levels of many environmental pollutants. The present study was designed to evaluate the possible effect of environmental exposure to cadmium and zinc on renal function among painters in Sulaimani city. Cross sectional study was performed on 37 male painting workers in Sulaimani city. Each worker was interviewed using structured questionnaire. Twenty five non-exposed healthy subjects were included as control group. Venous blood samples (10 ml) were obtained by vein puncture from both subjects and utilized for estimation of serum urea, creatinine levels, serum le
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More