Back ground: In Iraq, after 2003 had more
accidents of the shell, bullet and stab abdominal
wounds, more over colon injuries.
Objective: The aim of this study is to evaluate
the most appropriate management of penetrating
colon injuries, comparing the primary repair with
the diversion.
Methods: Eighty patient series with shell, bullet
and stab colonic injuries during 4.5 years period
from June 2006-december 2010 at Al-Yarmouk
teaching hospital. The study compared the use of
primary repair versus diversion, analyzing
variables such as sex, age, severity of injury and
mortality rate.
Results: there were total 80 patients ,62 (77.5%)
male and 18(22.5%) female .male :female ratio
3.4:1. the most affected age group was 21-30
years. 47 patients 58.75% were shell injuries.28
patients 35% were bullet injuries. 5 patients
6.25% were stab wounds. 46 patients 57.5%
managed by primary repair ,one of them 1.25%
died, while diversion in34patients 42.5%
different grades of colon injuries ,5 of them
6.25% died ,this was due to different factors such
as multiple organ injuries and post operative
complications.
Conclusion: the primary repair is safe and
effective regarding morbidity and mortality in
the management of grade II, III penetrating colon
injuries with minimal risk factors as compared to
diversion.
The study aims at diagnosing the importance of environmental analysis (external, industrial and internal) in the organization's strategy for the development of public organizations. The theoretical problem derived from the existence of a knowledge gap for studies and research that dealt with the variables of the study. Three public organizations were selected as the study society (the Civil Defense Directorate, the Directorate of Nationality, Passports and Residency, the General Traffic Directorate). The sample of the study was a sample of (215) managers (managers, department managers, Analysis of the data and hypothesis testing using the appropriate statistical tools, Pearson, the simple and multiple regression coefficient to te
... Show MoreOne of the most common procedures in oral surgery is the removal of impacted mandibular third molars, often followed by pain, swelling, alveolitis, and trismus. Purpose. To compare the outcomes of the intrasocket application of 1% hyaluronic acid oral gel (HA) and advanced platelet-rich fibrin (A-PRF) on the expected postoperative complications, pain, swelling, and trismus follow the surgical extraction of the impacted mandibular third molar. Material and Methods. A randomized controlled trial was conducted at the Oral and Maxillofacial Surgery Unit, Dental Teaching Hospital. Healthy patients who required surgical removal of the impacted mandibular third molar were divided randomly into three groups. The extraction site of the group
... Show MoreMM ABDUL-WAHHAB, SA AHMED, International Journal of Pharmaceutical Research, 2020 - Cited by 2
Violence is one of the most serious threats facing societies because it affects their internal structure and threatens the security and stability of society. It is classified as one of the types of security crises that are emerging in Arab and Islamic societies in particular, and in most countries of the world in general.
The threat of this crisis is increasing. Terrorism is considered as one of the most serious aspects of that all the countries of the world, currently, suffer from. The terrorism has begun to penetrate deep into society in one way or another starting from the Second World War, which led to the emergence of leftist movements in Western Europe, Japan, France, Italy and other countries as a result of emerging ideas
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show More