Background: Pain is one of the most postoperative complications of surgical wound especially within first 24 hrs. leading to delay hospital discharge, stress gastritis and increasing blood pressure. As wound infiltration with long acting local anesthetic (bupivacaine) has been proved to be effective after orthopedic surgeries especially total hip and knee replacements.Objective: our study was designed to determine theeffectiveness of local infiltration of 0.5% of bupivacainebefore closure of surgical wounds in controllingpostoperative pain and improve patient’s outcome after totalhip and knee replacement surgeries in first 24hrspostoperative period.Methods: Twenty patients from class I (healthy patients) and class II (patients mild systemic diseases) of ASA (American society of anesthetists) undergoing elective orthopaedic surgeries were randomly assigned in two groups and (both of them have general anesthesia); Group A (10patients) received local infiltration of 0.5% bupivacaine before closure of surgical wounds and group B (10 patients) received local infiltration of 0.9% of normal saline. We use uniform technique of anesthesia in both at rest and on passive mobilization by nurses and residents groups. Visual analogue pain scale scores were assessedblinded to analgesic treatment and we check the needs for analgesic drugs post-operative in both groups.Results: Group A showed a significant reduction inpostoperative pain at rest and on mobilization afterinfiltration of 0.5% bupivacaine with short hospital stay andonly 3 patients need for post-operative analgesia ,while allpatients in group B require at least single dose of analgesialike pethidine or non-steroidal anti-inflammatory drugs.Conclusion: The use of 0.5% Bupivacaine by wound infiltration is effective for post-operative pain relief, as it reduces the requirements for additional post-operative analgesia after total hip and knee replacements.
The different interactions between cometary tail and solar wind ions are studied in the present paper based on three-dimensional Lax explicit method. The model used in this research is based on the continuity equations describing the cometary tail-solar wind interactions. Three dimensional system was considered in this paper. Simulation of the physical system was achieved using computer code written using Matlab 7.0. The parameters studied here assumed Halley comet type and include the particle density , the particles velocity v, the magnetic field strength B, dynamic pressure p and internal energy E. The results of the present research showed that the interaction near the cometary nucleus is mainly affected by the new ions added to the
... Show MoreTexture synthesis using genetic algorithms is one way; proposed in the previous research, to synthesis texture in a fast and easy way. In genetic texture synthesis algorithms ,the chromosome consist of random blocks selected manually by the user .However ,this method of selection is highly dependent on the experience of user .Hence, wrong selection of blocks will greatly affect the synthesized texture result. In this paper a new method is suggested for selecting the blocks automatically without the participation of user .The results show that this method of selection eliminates some blending caused from the previous manual method of selection.
In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.
The base of the ELWE MPF-1 microcomputer is the Z80 microprocessor. The Z80 programs are written in assembly language. The main advantage of assembly language is that: it is much faster to code and the mnemonics makes it easier for the user to remember the instruction. The purpose of this paper is to improve the monitor process for didactic microcomputer ELWE MPF-1 by appending new powerful commands (MOVE, FILL, SEARCH and COMPARE) to the existing monitor to make it more useful and flexible. 8085 assembly language is used to execute this program. The letters used for abbreviation: M for MOVE, F for FILL, S for SEARCH and C for COMPARE.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThe heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units. Evaluation of reservoir characterization was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) and global hydraulic elements (GHE
... Show More