Background: Penetrating Neck Injuries (PNI) management represents a challenge to most surgeons in civilian trauma, in weighing selective versus mandatory exploration of all cases in different circumstances. Data are encouraging surgeons to adopt the former approach.Objectives: The study aims to assess the selective approach in our war and terror time events in Al-Yarmouk teaching hospital.Type of the study:A retrospective study. Methods: Data of patients presented to the Thoracic and Vascular ward in Al-Yarmouk teaching hospital with PNI were assessed retrospectively, from March 2013 to March 2015, and analyzed for epidemiology, mechanism of trauma, management methods, associated organ injuries, complications and mortality. Results: Among 83 patients (76 males and 7 females) who presented with PNI, the mean age was 28.5±15 years with a peak incidence in third decade. Shell injury (52.2%) was the most common mechanism and zone II was the most frequently injured (49.4%). Therapeutic exploration of neck in 82% of the cases, a decision of surgical exploration (87%) patients. Vascular injuries were the most identified neck structures (39.5%). Chest injuries (35%) were the most common associated injuries identified in patients who had additional anatomic region injury (41%) beside PNI. Complication rate of 18% and infection (26.6%) were most common and mortality rate was 8%. Conclusions: Still the selective approach is preferable in management of PNI in our war and terror time circumstances and limited resources of country.
The research aims to identify the level of selective visual attention among students of the faculties of education at the University of Mosul. To achieve the goal of the research, the researchers chose a stratified random sample of students from the faculties of education at the University of Mosul for the academic year (2020-2021). The sample size was (652) students from the scientific and humanitarian specializations, the second and fourth stages. The researchers developed a test of multiple-choice to measure the selective visual attention, which consisted of (42) items. The results revealed that the students of the faculties of education for human sciences have an appropriate level of selective visual attention. There are statisticall
... Show MoreMost of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct
We demonstrate that the selective hydrogenation of acetylene depends on energy profile of the partial and full hydrogenation routes and the thermodynamic stability of adsorbed C2H2 in comparison to C2H4.
Inflammatory control is essential to diminish injury and make renal injury treatment simpler. Proposed therapeutics have primarily targeted pro-inflammatory variables. Juniperus oxycedrus was frequently used to treat a variety of infectious disorders, hyperglycemia, obesity, TB, bronchitis, inflammation, and pneumonia. Juniperus oxycedrus twigs and leaves were defatted with n-hexane using Soxhlet apparatus then the residue of plant material dried and re-extracted sequentially by two different solvents Ethylacetate and methanol. The pro-inflammatory markers IL-1 and iNOS, as well as the potential kidney biomarker KIM-1, TNF-α, and transcription factor NF-KB were measured using the RealTime Quantitative qPCR method. The results showed that J
... Show MoreThe research aims to identify and diagnose the public relations strategies in its digital online communications by the United Nations High Commissioner for Refugees (UNHCR) in managing the crisis of Iraqi refugees in Turkey. A content analysis form was designed for the digital content of the UNHCR's website dedicated to topics and issues concerning Iraqi refugees that were covered by the site, adopting a comprehensive enumeration approach. The study covered the period from 01/03/2022, to 30/06/2022. The research yielded several key findings, including the predominant use of media, advertising, and education strategies in managing the crisis of Iraqi refugees in Turkey. News and reports ranked first among the media
... Show MoreShe noted most of the results of research conducted on the use of computers and the Internet in the areas of administrative, economic, agricultural and educational to a significant improvement in learning outcomes of these groups in the development of mechanisms of action, has increased rates of computer use and applications in various spheres of life at very fast pace so that the computer and the Internet is a vital part of any activity, whether administrative or research or the media, hence it can be said that the use of computers and the Internet in the management of public relations activities in any organization can accelerate the pace of echo positive goals and purposes of public relations, this study comes to looking at us
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: Cerebrospinal fluid leak is a relatively common problem ranging from 0.5% to 18% with traumatic or incidental injury to the Dura intra-operatively1, 2. Traumatic injury mostly occurs due to mechanical trauma with subsequent thecal sac laceration mainly in the thoracolumbar region. Incidental Dural injury commonly happens in patients undergoing spinal surgery for any reason.
Objective: Introduce a maneuver to be used during operations when the patients have either traumatic or iatrogenic injury to the Dura which would prevent CSF leak post-operatively.
Method: A case series study conducted in Baghdad, medical city, between June 2014 an
... Show MoreThe present search aims to develop a test for selective attention, cognitive load and thinking mistakes and measuring these concepts among Baghdad university students. To make a comparison between the selective attention, cognitive load, and the mistakes of thinking among students in term of gender. To identify the relationship among the selective attention, cognitive load and the mistakes of thinking of university students. To achieve these purposes, the searcher has developed a test for selective attention, cognitive load, and the mistakes of thinking. Then, these tools were applied to a sample of (200) university students were selected from (21) college. The researcher used t-test of one sample, t-test of two independent
... Show More