Infection at the site of vascular anastomosis is a serious complication of vascular surgery and is associated with a high limb loss and mortality rate. The classical method of management is ligation of the injured artery, adequate wound debridement and restoration of circulation. The latter is achieved by either in situ or extra-anatomic bypass. If the distal circulation is not maintained, subsequent amputation is most likely.
Objectives: In this study we tried to assess the efficacy of extra-anatomic synthetic bypass grafts in the treatment of vascular infection in the groin to save the limb and avoid the inevitable amputation.
Methods: Between January 2006 and December 2007, ten male patients aged twenty to thirty five years (mean=27.3years), with previous vascular surgery (reversed saphenous vein grafting) for sub-inguinal penetrating injuries complicated with infection and bleeding were admitted and managed surgically in the Department of Thoracic and Vascular Surgery, Surgical Specialties Hospital, Medical City Teaching Complex, Baghdad. These patients were studied retrospectively regarding their demographic and clinical features as well as details of the operative procedures and surgical outcome.
All patients received emergency wound debridement, arterial ligation and extra-anatomic synthetic (PTFE) bypass grafts (External iliac or common femoral to distal superficial femoral or popliteal artery, six routed laterally and four routed medially in the thigh away from the original surgical field).
Results: Excellent results were obtained in nine patients who saved amputation while one patient ended with above knee amputation. No mortality recorded.
Conclusion: Extra-anatomic bypass is a useful approach in dealing with infected and disrupted vascular anastomosis and can be used in emergency as well as elective situations as mentioned in most literatures.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreThe research entitled (The Visual Illusion in American Contemporary Ceramics) includes four chapters، the first chapter of which includes the methodological framework for the research، which contains the research problem focused on the following question: Has the American potter succeeded in achieving the artistic and aesthetic In the art of ceramics، as in the art of drawing and graphics، the fact that the art of ceramics has its advantages and limits in terms of material and technology? The aim of the research was to identify visual illusions in visual art in the works of a selected group of American potters. While the importance of the research was evident in that it sheds light on the methods and techniques of optical art in cont
... Show MoreThe study of cultural identity and its data in the designer’s work is considered a cultural nature to highlight the cultural identity and link it to the national culture of their country and society. It provides a reflection and translation of the society’s culture, traditions, social and economic dimensions, the natural environment, and scientific phenomena. Within meanings translated into a variety of methods, including expressive and realistic, which defines the designer’s relationship with his society and the national culture of his country and his connection with the civilization of the country.
The research problem came with the following question: What are the data of cultural identity in the work of designer David Gent
The research problem lay in the existing of this direct relation between the increasing and the big variety of the goods and the producing companies which mean the increase of the competition and the directing techniques of the commercial advertisings, which become spread everywhere and in an age characterized with the great varieties in the tests and the stances which requires the designers to seek designing accomplishments that are characterized with creativeness , seriousness and unsallity through the designer depending in constructing his / her texts and his/ her visual items on reference forms metaphors to achieve his / her designing purposes.
So the researcher through her primary flying study seek the identifying the manner of
Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors
The feature that prevails in spoken political discourse - especially with regards to the fact
that it is otherwise used in the written one - is relatively high degree of formality. It is then just
logical that formality is usually accompanied with more polite forms and higher degree of
impersonality. Such discourse is characterized by the choice of specific vocabulary and syntactic
structures as well. However, there are some tendencies to bring political speech nearer to the
everyday discourse and that is why political speeches have been becoming more informal and
personal. Like any other types of discourse, the American political speeches are loaded with
deictic expressions that form an essential complementary
In pre- Islamic poetry, there are a lot of words that indicate
peacefulness of one sort of another, in addition to the inspirations of semantic
modeling in which the poet sets himself in various horizons.
Among these words: brother, comrade, friend, companion, lover,
people, prince, home, land, country, blessing, honesty, contract, company,
justice, thankfulness, forgiveness, pardoning, guest, goodness, faithfulness,
silence, death, peace,….
In addition, there are their derivatives from various aspects that indicate
peacefulness either directly or indirectly.
Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show More