Back ground: In Iraq, after 2003 had more
accidents of the shell, bullet and stab abdominal
wounds, more over colon injuries.
Objective: The aim of this study is to evaluate
the most appropriate management of penetrating
colon injuries, comparing the primary repair with
the diversion.
Methods: Eighty patient series with shell, bullet
and stab colonic injuries during 4.5 years period
from June 2006-december 2010 at Al-Yarmouk
teaching hospital. The study compared the use of
primary repair versus diversion, analyzing
variables such as sex, age, severity of injury and
mortality rate.
Results: there were total 80 patients ,62 (77.5%)
male and 18(22.5%) female .male :female ratio
3.4:1. the most affected age group was 21-30
years. 47 patients 58.75% were shell injuries.28
patients 35% were bullet injuries. 5 patients
6.25% were stab wounds. 46 patients 57.5%
managed by primary repair ,one of them 1.25%
died, while diversion in34patients 42.5%
different grades of colon injuries ,5 of them
6.25% died ,this was due to different factors such
as multiple organ injuries and post operative
complications.
Conclusion: the primary repair is safe and
effective regarding morbidity and mortality in
the management of grade II, III penetrating colon
injuries with minimal risk factors as compared to
diversion.
This paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreBackground: Potentially malignant oral disorders (PMODs) are common precursors of oral squamous cell carcinoma (OSCC). Neoangiogenesis and signalling are important intermediate biomarkers that may govern the progression of dysplastic mucosa into carcinoma. Aims: Evaluate the importance of CD34 and Wnt3 expression in PMODs and OSCCs in relation to their clinicopathological parameters. Settings and Design: Prospective cross-sectional study. Materials and Methods: Immunohistochemical staining for CD34 and Wnt3 was performed for 41 samples. These included 27 PMODs, six OSCCs and eight normal gingival and alveolar mucosa. Analysis of variance (ANOVA) and post-hoc tests were applied. P<0.05 was considered statistically significant. Results: CD34
... Show MoreThe road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th
... Show MoreAbstract Background The aim of this study was to identify differences in oral cancer incidence among sexes, age groups and oral sites over time in Iraqi population. Methods Data was obtained from Iraqi cancer registry, differences and trends were assessed with the Wilcoxon matched-pairs signed-ranks test and Regression test, respectively. Results In Iraq from 2000 to 2008, there were 1787 new cases of oral cancer registered, 1035 in men and 752 in women. Cancer at all oral sites affected men more than women. The Tongue other (ICD-02) is the most frequent site follow by lip (ICD-00). Conclusion The decrease in the percent of oral cancer incidence in Iraq not compatible with the high percent of exposure to the risk factors, Iraqi cancer regis
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
The research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of
... Show MorePiracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.