Background: Acute appendicitis is a common surgical
problem that is associated with an acute-phase reaction.
Previous studies have shown that cytokines and acutephase proteins are activated and may serve as indicators for
appendicitis.
Objective: The aim of this study was to evaluate of serum
levels of interleukin-6 (IL-6) in correlation to the severity
to acute appendicitis.
Methods: This is a prospective study from December 2008
to March 2009 of patients who had appendectomy in
Department of Surgery, Al-Kindy Teaching Hospital -
Baghdad/Iraq. Serum for estimating levels of interleukin-6
(IL-6) was taken pre-operatively. Depending on the
macroscopic evidence during the operation and the
histopathological examination of the specimens, the
patients were separated into 3 groups, group one with
negative appendectomy (normal appendix), group two with
non-complicated acute appendicitis (catarrhal,
suppurative), and group three with complicated acute
appendicitis (perforated, gangrenous). The
histopathological results were correlated with IL-6 values
statistically.
Results: A total number of 50 patients were included in
this study, 28 male (56%) and 22 female (44%). The mean
age was 23 year (ranged from 7 to 50). On histological
examination, there were 7 patients (14%) in group one, 29
patients (58%) in group two, and 14 patients (28%) in
group three. Serum IL-6 values gave true negative results
in 6%, true positive results in 82%, false negative results in
4%, and false positive results in 8%. We determined,
therefore, in the present study the sensitivity, specificity,
and accuracy of serum IL-6 were calculated as 95.34%,
42.85%, and 88% respectively.
Conclusion: Laboratory results should be considered to be
integrated within the clinical assessment. If used critically,
IL-6 can provide surgeons with complementary
information in discerning the necessity for urgent
operation
Adolescence is considered to be one of the most dangerous and delicate stages that a juvenile goes through. It is a stage which the juvenile enters while he is a child, and emerges from it by being able to have children, but this does not mean the ability to become socially and psychologically mature
The Wang-Ball polynomials operational matrices of the derivatives are used in this study to solve singular perturbed second-order differential equations (SPSODEs) with boundary conditions. Using the matrix of Wang-Ball polynomials, the main singular perturbation problem is converted into linear algebraic equation systems. The coefficients of the required approximate solution are obtained from the solution of this system. The residual correction approach was also used to improve an error, and the results were compared to other reported numerical methods. Several examples are used to illustrate both the reliability and usefulness of the Wang-Ball operational matrices. The Wang Ball approach has the ability to improve the outcomes by minimi
... Show MoreThe spectral response of the Si solar cell does not coincidence with the sun irradiance spectrum, so the efficiency of the Si solar cell is not high. To improve the Si solar cell one try to make use of most region of the sun spectrum by using dyes which absorb un useful wavelengths and radiate at useful region of spectrum (by stock shift). Fluorescence's dye is used as luminescent concentrator to increase the efficiency of the solar cell. The results show that the performance efficiency and out power for crystalline silicon solar cells are improved.
Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreIn this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.
PVC membrane sensor for the selective determination of Mefenamic acid (MFA) was constructed. The sensor is based on ion association of MFA with Dodecaphospho molybdic acid (PMA) and Dodeca–Tungstophosphoric acid(PTA) as ion pairs. Nitro benzene (NB) and di-butyl phthalate (DBPH) were used as plasticizing agents in PVC matrix membranes. The specification of sensor based on PMA showed a linear response of a concentration range 1.0 × 10–2 –1.0 × 10–5 M, Nernstian slopes of 17.1-18.86 mV/ decade, detection limit of 7 × 10-5 -9.5 × 10 -7M, pH range 3 – 8 , with correlation coefficients lying between 0.9992 and 0.9976, respectively. By using the ionphore based on PTA gives a concentration range of 1.0 × 10–4 –1.0 × 10–5 M,
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThis study aimed to explore the relationship between cyberbullying and levels of pessimism and optimism among female university students, emphasizing the significance of these variables in students' psychological well-being. The research problem was identified in the increasing rates of cyberbullying among female students and its negative impact on optimism and pessimism, alongside the lack of effective counseling programs addressing this issue. The study sample consisted of 30 third-year students from the College of Physical Education and Sports Sciences for Women during the academic year 2023--2024. The participants were deliberately selected through a lottery method. The researchers employed the descriptive survey method as it suited the
... Show More