Background: Acute cholecystitis is common surgical
problem, which was treated previously by conservative
treatment .Later early open has been introduced as an
alternative to interval for treatment of acute cholecystitis.
Early open was found to be a safe, successful with
comparable postoperative complication rate. With the
advent of laparoscopy laparoscopic have been used for
chronic cholecystitis and became the first line of
treatment. New reports have shown that laparoscopic can
be used as an alternative to open for surgical treatment of
acute cholecystitis.
Objectives: to compare the success, safety of early
laparoscopic versus early open as a primary treatment of
acute cholecystitis.
Methods: out of 68 patients were treated for clinical
acute cholecystitis between January 2002 and February
2004 in the department of surgery, at Al – Kindy teaching
hospital. A total of 62 patients underwent early for acute
cholecystitis as soon as possible after diagnosis. The
preferred preoperative imaging technique was ultrasound.
30 (48.3%) of the operations were attempted
laparoscopically, whereas the remaining 32 patients
(51.7%) underwent initial open .
Results: The mean operative time for the open cases
was 75 minutes versus 60 minutes for the laparoscopic
group. There was no perioperative mortality in either
group. The incidence of conversion to open was 10% (3
patients). Surgical complications related to laparoscopic
and open occurred in 2 (6.6%) and 3 (9.3%) cases,
respectively. There was no difference between the open
and laparoscopic groups in regard to the major
postoperative complications.
Conclusion: The current study shows that early
(whether performed by open or laparoscopically) is a
safe and effective treatment for acute cholecystitis. Low
conversion rates can be maintained with strict guidelines
for appropriate patient selection, adequate experience,
and proper laparoscopic technique.
Suppose that
Copper indium disulphide, CuInS2, is a promising absorber material for thin film photovoltaic which has recently attracted considerable attention due to its suitability to reach high efficiency solar cells by using low cost techniques. In this work CuInS2 thin films have been deposited by chemical spray pyrolysis onto glass substrates at ambient atmosphere, using different [Cu]/[In] ratio in the aqueous solutions at substrate temperature 3000C
and different annealing temperatures . Structural and optical properties of CIS films were analyzed by X-ray diffraction, and optical spectroscopy. Sprayed CIS films are polycrystalline with a chalcopyrite structure with a preferential orientation along the 112 direction and no remains of oxides
The current research deals with practical studies that explain to the Iraqi consumer multiple instances about the phenomenon of water hammer which occur in the water pipeline operating with pressure. It concern a practical study of the characteristics of this phenomenon and economically harmful to the consumer the same time. Multiple pipe fittings are used aimed to reduce this phenomenon and its work as alternatives to the manufactured arresters that used to avoid water hammer in the sanitary installations, while the consumer did not have any knowledge as to the non-traded for many reasons, including the water pressure decreases in the networks and the use of consumer pumps to draw water directly from the network. Study found a numbe
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show More