Pain is a sensory and emotional experience that is influenced by physiologic, sensory, affective, cognitive, socio-cultural and behavioral factors. Postoperative pain is the commonest reason for delayed discharge and unanticipated hospital admission after ambulatory surgery. Our Objective is to test the hypothesis that administration of 2 ml/kg/hr preoperative IV fluids may attenuates postoperative pain.The study was carried out in the Baghdad Teaching Hospital, Al-Yarmok Teaching Hospital and Al-Karama Teaching Hospital from 12 May till 17 June 2009. The total number of patients was 120 (35 males and 85 females) with their age ranged between 10-90 years. The patients were divided into two groups according to administration of preoperative IV fluids, group A (65 patients) did not receive IV fluids and group B (55 patients) received IV fluids preoperatively. Regarding group A, the pain scale was ≤ 5 in 15.3% of patients, and it was >5 in 84.7% of patients and these results obtained within 0-5 hours after awaking from anesthesia. Whereas in group B, the pain scale was ≤5 in 29.09% of patients and was >5 in 70.9% of patients. We have demonstrated that the preoperative administration of 2ml/kg/hr IV fluids (crystalloid) to patients who had fasted from fluids decreased the severity of postoperative pain, and the need for postoperative analgesia. We report for the first time that administration of large volume preoperative IV fluids significantly reduce the incidence and severity of pain in patients at high risk for pain. Key words: I.V fluids, Pain, Surgery.
The adsorption of Malonic acid, Succinic acid, Adipic acid, and Azelaic acid from their aqueous solutions on zinc oxide surface were investigated. The adsorption efficiency was investigated using various factors such as adsorbent amount, contact time, initial concentration, and temperature. Optimum conditions for acids removal from its aqueous solutions were found to be adsorbent dose (0.2 g), equilibrium contact time (40 minutes), initial acids concentration (0.005 M). Variation of temperature as a function of adsorption efficiency showed that increasing the temperature would result in decreasing the adsorption ability. Kinetic modeling by applying the pseudo-second order model can provide a better fit of the data with a greater correla
... Show MoreStraight tendons in pretensioned members can cause high-tensile stresses in the concrete extreme fibers at end sections because of the absence of the bending stresses due to self-weight and superimposed loads and the dominance of the moment due to prestressing force alone. Accordingly, the concrete tensile stresses at the ends of a member prestressed with straight tendons may limit the service load capacity of the member. It is therefore important to establish limiting zone in the concrete section within which the prestressing force can be applied without causing tension in the extreme concrete fibers. Two practical methods are available to reduce the stresses at the end sections due to the prestressing force. The first method based
... Show MoreCeramics type Yttrium oxide with Silicon carbide. were selected to investigate its sintered density, microstructure and electrical properties, after adding V2O5, of 100 nm grain size. Different weight percentages ranging from (0.01,0.02,0.03 and 0.04) were used. Dry milling applied for twelve hours. The pelletized samples were sintered at atmospheric of static air and at sintering temperature 1400 ˚C, for three hours. The crustal structure test shoes the phase which is yttrium silicon carbide Scanning electron microscopy, scan sintered microstructure. Samples after sintering were electrically investigated by measuring its capacitance, dielectric constant and their results showed increasing after added V2O5 particles at the combinat
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreA novel series of chitosan derivatives were synthesized via reaction of chitosan with carbonyl compounds and grafted it’s by with different amine compounds substituted hydrogen. The produced polymers were characterized by different analyses FTIR, 1HCNMR, XRD, DSC and TGA. Solubility in water as well as many solvent was investigated, antibacterial activity of chitosan and its derivatives against two types of bacteria E. coli and S. aureus was also investigated. The results showed that derivatives sort of have antibacterial activities against Esherichia coli (Gram negative) better than chitosan whilst compound IX has better antibacterial against Staphylococcus aureus (Gram positive). SEM analysis showed that increase of surface roughness wi
... Show MoreThis paper deals with modelling and control of Euler-Bernoulli smart beam interacting with a fluid medium. Several distributed piezo-patches (actuators and/or sensors) are bonded on the surface of the target beam. To model the vibrating beam properly, the effect of the piezo-patches and the hydrodynamic loads should be taken into account carefully. The partial differential equation PDE for the target oscillating beam is derived considering the piezo-actuators as input controls. Fluid forces are decomposed into two components: 1) hydrodynamic forces due to the beam oscillations, and 2) external (disturbance) hydrodynamic loads independent of beam motion. Then the PDE is discretized usi
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreEvaluating the behavior of a ring foundation resting on multi-layered soil is one of the important issues facing civil engineers. Many researchers have studied the behavior of ring foundation rests on multi-layered soil with vertical loads acting on the foundation. In real life ring foundation can be subjected to both vertical and horizontal loads at the same time due to wind or the presence of soil. In this research, the behavior of ring footing subjected to inclined load has been studied using PLAXIS software. Furthermore, the effect of multi-layered soil has been simulated in the model. The results showed that both vertical and horizontal stresses are mainly affected when the inclination angle of the load exceeded 45 degrees with a reduc
... Show MoreFinancial institutions, including banks, remain a major target for money launderers in order to transfer illegal funds to legitimate funds through limited internal audit procedures and external auditing.
The study is a study of the operations of money laundering and what can be done by the verification efforts when integrated in the fight against them, by analyzing the level of cooperative relationship and communication between them. To achieve the objectives of the study, a questionnaire prepared for this purpose was distributed to an appropriate sample of (60) auditors of the internal audit staff of the Central Bank of Iraq and the external auditors working in the Federal control foundation Accordingly , appropriate methods wer
... Show More