Background: Acute appendicitis is a common surgical
problem that is associated with an acute-phase reaction.
Previous studies have shown that cytokines and acutephase proteins are activated and may serve as indicators for
appendicitis.
Objective: The aim of this study was to evaluate of serum
levels of interleukin-6 (IL-6) in correlation to the severity
to acute appendicitis.
Methods: This is a prospective study from December 2008
to March 2009 of patients who had appendectomy in
Department of Surgery, Al-Kindy Teaching Hospital -
Baghdad/Iraq. Serum for estimating levels of interleukin-6
(IL-6) was taken pre-operatively. Depending on the
macroscopic evidence during the operation and the
histopathological examination of the specimens, the
patients were separated into 3 groups, group one with
negative appendectomy (normal appendix), group two with
non-complicated acute appendicitis (catarrhal,
suppurative), and group three with complicated acute
appendicitis (perforated, gangrenous). The
histopathological results were correlated with IL-6 values
statistically.
Results: A total number of 50 patients were included in
this study, 28 male (56%) and 22 female (44%). The mean
age was 23 year (ranged from 7 to 50). On histological
examination, there were 7 patients (14%) in group one, 29
patients (58%) in group two, and 14 patients (28%) in
group three. Serum IL-6 values gave true negative results
in 6%, true positive results in 82%, false negative results in
4%, and false positive results in 8%. We determined,
therefore, in the present study the sensitivity, specificity,
and accuracy of serum IL-6 were calculated as 95.34%,
42.85%, and 88% respectively.
Conclusion: Laboratory results should be considered to be
integrated within the clinical assessment. If used critically,
IL-6 can provide surgeons with complementary
information in discerning the necessity for urgent
operation
At the heart of every robust economy is a vital banking system. The functional banking system can effectively perform several functions such as mobilizing savings, allocating credit, monitoring managers, transforming risks, and facilitating the financial transactions. This paper aims to measure the impact of banking system development on economic growth in Iraq. Credit to private sector divided by GDP used as a proxy of banking development. Real per capita GDP used as a proxy of economic growth. By using Autoregressive Distributed Lag (ARDL) model, the paper finds that the undeveloped Iraqi banking system could not promote economic growth in the country. Therefore, a variety of policies need to be taken to spur the role of bankin
... Show MoreAbstract:
The issues related to foreign trade is a broad field for discussions and captures the interest of economists for their contribution to the process of economic development in the economies of the countries, especially developing ones. The imports of goods and services in foreign trade constitute an important part of the local by which the economy gets goods and services that the economy cannot produce because of the incompetent base of production. Further, the demand function of imports occupied a good deal of the attention of researchers in the field of international economics for which agricultural imports constitute an important part. The reason for the interest in the subject is due to its im
... Show MoreBusiness organizations strive to reach organizational excellence, in instruction to maintain their position in the market, so the research started from the problem of the weakness of the senior leaders in the two companies investigated in the management and sustainability of work, as well as their inability to face challenges that could affect the work of the two companies in the future, especially the lack of organizational of the future and the prediction of those events, so the two companies seek to explore and invest opportunities to achieve organizational excellence. The research aims to know the role of Ambidexterity leadership behaviors in organizational excellence in my company .and create ideas that will achieve organizati
... Show MoreThe study seeks to identify e-governance requirements in human resources management, which are (administrative requirements, technical, human, financial, and security) which is a new style differs from the traditional management pattern, where work depends on multiple forms and methods of Tools, (e. g. computers and various electronic software), by relying on powerful information systems that help to make management decisions as quickly and less effortless and less expensive to keep up with the tremendous technological advancements in the field of information and communication technology revolution.
The sample included 132 Person who constitute a position (Director General, assistant Director General, section managers and d
... Show Moreيهدف البحث إلى تقييم الكفاءة الوظيفية لمؤسسات التعليم الأهلي في أداء وظيفتها بمستوى عالٍ لتشبع حاجة سكان المدينة الذين فضّلوا التعليم الأهلي على التعليم داخل المؤسسات الحكومية مما أدى إلى انتشارها، وصولا إلى أهم الآثار المترتبة على ذلك الانتشار إذ نافست فيه مؤسسات التعليم الحكومي، بل وتنافست المؤسسات الأهلية فيما بينها لتقديم أفضل خدمة تعليمية للصراع من أجل البقاء، وتهدف أيضا إلى إظهار الوجه السلبي ا
... Show MoreThis study was conducted to detect the relationship between organic content in the sediment of Rivers Tigris and Diyala, at two locations south of Baghdad, with some environmental factors and the benthic invertebrates and values of diversity indices. Monthly samples collected from the area for the period November 2007 to October 2008. Results showed differences in the physical and chemical characteristics of the two sites, Where the annual average in Tigris and Diyala were respectively for: water temperature (19, 20) C°, pH (8, 8), dissolved oxygen (4, 8) mg / l , Biochemical oxygen Demand BOD5 (3,44 ) mg/l, TDS (632,1585) mg / l, TSS (42, 44) mg / l, turbidity (28,74) NTU, and total hardness as CaCO3 (485,823) mg / l ,Sulfat
... Show MoreThis study aims to study some morphological and reproductional characteristics in eleven species of two genera belonging to the family of Asparagaceae, which are Bellevalia Lapeyrouse, 1808 and Ornithogalum Linnaeus, 1753 and the species are: Bellevalia chrisii Yildirim and Sahin, 2014; Bellevalia flexuosa Boissier, 1854; Bellevalia kurdistanica Feinbrun, 1940; Bellevalia longipes Post, 1895; Bellevalia macrobotrys Boissier, 1853; Bellevalia paradoxa Boissier, 1882; Bellevalia parva Wendelbo, 1973; Bellevalia saviczii Woronow, 1927; Ornithogalum brachystachys C. Koch, 1849; Ornithogalum neurostegium Boissier, 1882 and Ornithogalum pyrenaicum Linnaeus, 1753. These species were identified and compared with each other; the results showed th
... Show MoreIn this research local wheat peel was used as an adsorbent surface for removal of Azure B (AB) dye from the aqueous solution. The adsorption process was performed at different experimental parameters, equilibrium time, temperature, ionic strength and solution pH. The isotherms of adsorption are of H-type as compared with Giles curves and the adsorption data were coincide with Freundlich equation. The adsorption kinetic data were analyzed using pseudo- first and second order kinetic models. The effect of temperature was studied and the amount of dye adsorbed was found to increase with the increasing of temperature from 25 to 50 oC. The values of thermodynamic functions like enthalpy and entropy have been estimated. The quantity of adso
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More