Background: Acute cholecystitis is common surgical
problem, which was treated previously by conservative
treatment .Later early open has been introduced as an
alternative to interval for treatment of acute cholecystitis.
Early open was found to be a safe, successful with
comparable postoperative complication rate. With the
advent of laparoscopy laparoscopic have been used for
chronic cholecystitis and became the first line of
treatment. New reports have shown that laparoscopic can
be used as an alternative to open for surgical treatment of
acute cholecystitis.
Objectives: to compare the success, safety of early
laparoscopic versus early open as a primary treatment of
acute cholecystitis.
Methods: out of 68 patients were treated for clinical
acute cholecystitis between January 2002 and February
2004 in the department of surgery, at Al – Kindy teaching
hospital. A total of 62 patients underwent early for acute
cholecystitis as soon as possible after diagnosis. The
preferred preoperative imaging technique was ultrasound.
30 (48.3%) of the operations were attempted
laparoscopically, whereas the remaining 32 patients
(51.7%) underwent initial open .
Results: The mean operative time for the open cases
was 75 minutes versus 60 minutes for the laparoscopic
group. There was no perioperative mortality in either
group. The incidence of conversion to open was 10% (3
patients). Surgical complications related to laparoscopic
and open occurred in 2 (6.6%) and 3 (9.3%) cases,
respectively. There was no difference between the open
and laparoscopic groups in regard to the major
postoperative complications.
Conclusion: The current study shows that early
(whether performed by open or laparoscopically) is a
safe and effective treatment for acute cholecystitis. Low
conversion rates can be maintained with strict guidelines
for appropriate patient selection, adequate experience,
and proper laparoscopic technique.
This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th
... Show MorePolymer films of PEG and PVA and their blend with different
concentrations of MnCl2 (0, 2, 4, 6 and 10 %.wt) were study using
casting technique. The X-ray spectra of pure PEG, PVA and
PVA:PEG films and with addition of 2% concentrations from
(MnCl2) show amorphous structures. The results for FTIR show the
interaction between the filler and polymer blend results in
decreasing crystallinity with rich amorphous phase. This
amorphous nature confirms the complexation between the filler and
the polymer blend. The optical properties of (PVA:PEG/MnCl2)
contain the recording of absorbance (A) and explain that the
absorption coefficient (α), refractive index (n), extinction coefficient
(ko) and the dielectric cons
In this article, the numerical and approximate solutions for the nonlinear differential equation systems, represented by the epidemic SIR model, are determined. The effective iterative methods, namely the Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM), and the Banach contraction method (BCM), are used to obtain the approximate solutions. The results showed many advantages over other iterative methods, such as Adomian decomposition method (ADM) and the variation iteration method (VIM) which were applied to the non-linear terms of the Adomian polynomial and the Lagrange multiplier, respectively. Furthermore, numerical solutions were obtained by using the fourth-orde Runge-Kutta (RK4), where the maximum remaining errors showed th
... Show MoreIn recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the d
... Show MoreGreen buildings are considered more efficient than traditional buildings due to the incorporated techniques and the multidisciplinary specializations required to comply with their specifications, in addition to the advanced commissioning, which undergoes before handing over the buildings to the owners to ensure requirements conformance. As a result, the appropriate selection of a project delivery system acts as the essential factor that affects the performance of the project. This research aims at building a system that helps to select the best method to implement green buildings. Through studying the recent research approaches in project delivery systems, the factors that affect the selection of the optimal implementation method fo
... Show MoreThere has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0.01-
... Show MoreThe study aims to build a water quality index that fits the Iraqi aquatic systems and reflects the environmental reality of Iraqi water. The developed Iraqi Water Quality Index (IQWQI) includes physical and chemical components. To build the IQWQI, Delphi method was used to communicate with local and global experts in water quality indices for their opinion regarding the best and most important parameter we can use in building the index and the established weight of each parameter. From the data obtained in this study, 70% were used for building the model and 30% for evaluating the model. Multiple scenarios were applied to the model inputs to study the effects of increasing parameters. The model was built 4 by 4 until it reached 17 parame
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show More