Background: The liver is one of the most common organs
injured after blunt abdominal trauma. The control of severe
hemorrhage remains a problem.
Methods: One-hundred thirty-eight patients diagnosed as
liver injury between 09/2003 and 08/2006 had been evaluated
prospectively in Al- Kindy Teaching Hospital.
A distinction was made between hemodynamically stable and
unstable patients. Different modalities of surgical procedures
were done concentrating on perihepatic gauze packing.
Results: (60 out of 138) patients included in the study were
clinically evaluated as hemodynamically stable. The average
abbreviated injury severity score (ISS) was 25. Twenty
patients underwent abdominal surgery. In 12 of them
additional liver treatment was performed. The mortality was
three, all were non-liver related.
Seventy eight patients were considered to be
hemodynamically unstable, and had an average ISS of 38. All
of them needed abdominal surgery.
Gauze packing was used as initial therapy for bleeding
control from injured liver in 34 patients of both
hemodynamically stable and unstable groups with a mortality
of 11 patients (32.7%).
Conclusion: perihepatic gauze packing is considered as a life
saving and a quick method for controlling ongoing
hemorrhage in the treatment of liver injuries before
undertaking definitive repair under controlled conditions
Background: Many materials were proposed as root canal obturating materials but the biocompatibility issue remains to be a critical one. Propolis has been used as a therapeutic agent since the time of Hippocrates. It is known that propolis exhibits some pharmacological activities, such as antibacterial, antiviral, antifungal and anti inflammatory activity. Materials and methods: Eighteen albino rats were used in the study and divided randomly into three groups of 6 animals for each group. Each group was scheduled to be sacrificed at different time periods, which were three days, one week and three weeks. Propolis and ZOE sealer implants of 4mm in diameter and 0.5 gm in weight were implanted in the dorsal side of the rats. At the end of the
... Show MoreThe aim of this study was to provide an overall assessment to the efficiency of the Iraq stocks exchanges (ISE) through specifying well –known models .First, Fama's efficient market hypothesis as a contrary concept to the random walk hypothesis, was performed and it has been found that ISE follows the random process, so the price of the shares can't be predicated on the basis of past information. Second,we use a multifactor model, which so named multiple regression, to explore the link between ISE and the main economic indicators. our empirical analysis finds that every weak associations exists between major ISE measures and main economic indicators.
Background: Oral squamous cell carcinoma is the most prevalent malignant neoplasm of the oral cavity which results from accumulated genetic and epigenetic alterations. It is not always inexorable and may be reversible if early intervention in the process can occur to prevent further genetic mutation and disease progression. The FHIT gene is a tumor suppressor gene located in FRA3B region which is the most active common fragile site, where DNA damage leading to aberrant transcripts and translocations frequently occur. The WWOX is a tumor suppressor gene that plays a central role in tumor suppression through transcriptional repression and apoptosis, with its apoptotic function the more prominent of the two. This study aimed to evaluate and co
... Show MoreA series of 4-(methylsulfonyl)aniline derivatives were synthesized in order to obtain new compounds as a potential anti-inflammatory agents with expected selectivity against COX-2 enzyme. In vivo acute anti-inflammatory activity of the final compounds 11–14 was evaluated in rat using an egg-white induced edema model of inflammation in a dose equivalent to 3 mg/Kg of diclofenac sodium. All tested compounds produced significant reduction of paw edema with respect to the effect of propylene glycol 50% v/v (control group). Moreover, the activity of compounds 11 and 14 was significantly higher than that of diclofenac sodium (at 3 mg/Kg) in the 120–300 minute time interval, while compound 12 expressed a comparable effect to that of di
... Show MoreAbortion is a condition that occurs due to one of the pathological injuries, often one of the members of the TORCH is the real cause. The current study aimed to investigate the impact of toxoplasmosis, HSV-2 infections with abortion, and also, the identification of immunogenetics marker (interleukin-10) that may be associated with abortion. Anti-Toxoplasma IgG, IgM, Herpes simplex virus-2 IgM, human soluble leukocyte antigen class I–G and interleukin10 were estimated by ELISA technique, while the expression of IL-10 gene was investigated by using the real-time PCR. The results showed that among aborted women the rate of anti-Toxoplasma and HSV-2 IgM antibodies occurred within the age groups (21–30) years and (31–40) years 32(100.0%) a
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More