Background : Bone infections is one of the most challenging orthopaedic complications, with considerable morbidity. There is significant impact on the life of the patients; socially, financially, physically, and mentally and it could be a limb-threatening complication. Osteomyelitis is a bone infection usually caused by bacteria, including mycobacteria, but mainly Staphylococcus aureus which is the most commonly responsible bacteria . Aim of study: To evaluate our management policy of chronic osteomylitis (C.O.M).
Methods : 32 patients presented with different types &forms of chronic osteomyelitis in many sites of long & flat bones such as tibia , femur, ,humerus ,iliac bones and knee joint , which are not response to previous management . patients age…. range from 17 to 45 years old. Our study period extended from 2003 to 2009 with about one year follow up. our management include radical local bone debridement with multiple bone drilling and multiple washing by many antiseptic agents plus post operative specific antibiotic regime include triple intravenous broad spectrum antibiotics for two weeks , followed by parentral another two antibiotic regime for minimum 1.5 month up to 3 months,
Results : From 32 patients involved in our study , 30 patients were found presented with non specific chronic osteomylitis in different form as following : 15 patients presented with tibial (C.O.M) & discharging sinus associated with offensive odder , 7 patients (21.8 % ) presented with (C.O.M) of femur, 7 patients (21.8 % ) presented with (C.O.M) of humerus mainly after internal fixation device application ( plate & screw )and one case (3.1 % ) presented with discharging pus from knee join as chronic septic arthritis . only two patients ( 6.2 % )presented with specific type of (C.O.M) such as T.B osteomylitis
All domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work
A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c
Solid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreProduced water is accompanied with the production of oil and gas especially at the fields producing by water drive or water injection. The quantity of these waters is expected to be more complicated problem with an increasing in water cut which is expected to be 3-8 barrels water/produced barrel oil.Produced water may contain many constituents based on what is present in the subsurface at a particular location. Produced water contains dissolved solids and hydrocarbons (dissolved and suspended) and oxygen depletion. The most common dissolved solid is salt with concentrations range between a few parts per thousand to hundreds parts per thousand. In addition to salt, many produced waters also contain high levels of heavy metals like zinc, bari
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreAbstract
The research aims at achieving a set of objectives, which is to study a vital variable in the organizations which is the talent management and its impact on encouraging and empowering employees to take part in making appropriate decisions with their heads in the Iraqi Cement State Company. The problem of this research is in finding solutions to the weaknesses that face the managers in attracting talented employees and keep them in the company, and this leads to a weak capacity of the company on authorizing talented employees and giving them the needed confidence to participate in decision making process. The research sample was included (45) managers in the researched company. Th
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreFor the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show MoreBackground: Ulcerative colitis is a chronic inflammatory condition characterized by relapsing and remitting episodes of inflammation limited to the mucosal layer of the colon.Loop ileostomy might be helpful in the management of the disease.
Objective: To evaluate the role of loop ileostomy in the management of ulcerative colitis.
Methods: Between Januarys 2008 and January 2018, patients with fulminant ulcerative colitis resistant to medical therapy had been referred to our surgical unit and were included in our study. Assessment of the patients’ medical status (serum electrolytes, total serum protein, complete blood count, erythrocyte sedimentation rate, general stool exam,and abdominal ultrasound
... Show More