ABSTRACT: BACKGROUND: Arthroscopic knee surgeries are performed in very large numbers worldwide, and in spite of relatively low complication rate, but the total number is significant. Some of these complications are due to tourniquet use and can be serious. OBJECTIVE: Is to asses if automated pump (with or without) dilute epinephrine saline irrigation can replace the tourniquet use in soft tissue arthroscopic knee surgeries. PATIENTS AND METHODS: 36 patients (9 females 25 % and 27 males 75 %) were included in this prospective experimental nonrandomized study, and were necessitated soft tissue arthroscopic knee surgeries. Patients were divided into two groups, in group A (patients) tourniquet and automated pump were used. In group B (18 patients) automated pump with or without epinephrine irrigation fluid were used. For both groups, visibility, time of surgery, amount of irrigation fluid used, pressure of pump, postoperative pain and hemoglobin level before and after surgery were assessed and compared. RESULTS: There was no significant statistical difference( p value more than 0.05) in regard to visibility, time of surgery, amount of irrigation fluid used, pressure of pump and postoperative pain between the two groups. There was no significant statistical difference between hemoglobin levels before and after surgery in both groups. CONCLUSION: Automated pump (with or without) dilute epinephrine saline irrigation can replace the tourniquet in soft tissue arthroscopic knee surgeries. KEY WORDS: arthroscopy , knee, pump, torniqute, epinephrine.
This study presents a rapid, sensitive, and straightforward approach to measure chlorpheniramine maleate (CPM) by using turbidity CFIA. The method involves CPM reacting with sodium nitroprusside (Nitropress) to produce a pale white precipitate. The NAG-SSP-5S1D analyzer was used to measure turbidity at 0°–180° angle to detect the attenuation of incident light as a result of collision on the surfaces of the precipitate particles. The linear range of CPM measurements was between 0.008 and 11 m.mol/L, with correlation coefficient of 0.9983 and R2% = 99.65. The limit of detection was determined to be 0.0328 µg/sample from the lowest concentration in the calibration curve, and the repeatability of the method (RSD%) was less than 0.4% (n = 6
... Show MoreAs a result of the entry of multinationals companies in Iraq for investing in the joint projects through conducting agreements and contracts for work on important and strategic projects to get the necessary funds and various experiences which characterize the foreign participant sides that Iraq currently needs them and because of the non-applying the accounting processing stipulated in the unified accounting system in addition to the absence of a local accounting bases as well as the default of the participant contracts on indicating the accounting methods about those projects which are considered one of the bases that enables auditors in the public sector to depend on it, thus the research paper deals with studying an
... Show MoreThe research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show MoreResin-modified glass ionomer cement tends to shrink due to polymerization of the resin component. Additionally, they are more prone to syneresis and imbibition during the setting process. This
Cantilever beams are used in many crucial applications in machinery and construction. For example, the airplane wing, the microscopic probe for atomic force measurement, the tower crane overhang and twin overhang folding bridge are typical examples of cantilever beams. The current research aims to develop an analytical solution for the free vibration problem of cantilever beams. The dynamic response of AISI 304 beam represented by the natural frequencies was determined under different working surrounding temperatures ((-100 ℃ to 400 ℃)). A Matlab code was developed to achieve the analytical solution results, considering the effect of some beam geometrical dimensions. The developed analytical solution has been verified successful
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Background: Polymeric composites have been widely used as dental restorative materials. A fundamental knowledge and understanding of the behavior of these materials in the oral cavity is essential to improve their properties and performance. The goal of this study was to measure water sorption of four composite resins containing different filler and resin matrix contents. Materials and method: Resin composite specimens giomer (Beautifil II) Filtek™ P90, Filtek™ Z350 XT, and Tetric N Ceram were prepared in a cylindrical mould of 3mm thickness and 6mm diameter (n=10) and light cured . All specimens placed in silica-gel desiccators at 37˚C for seven days, a constant weight was obtained. All samples were immersed in deionized distill
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More