Resumo Objetivos: determinar a eficiência e segurança de três regimes de misoprostol para interrupção da gravidez no segundo trimestre em indivíduos com duas ou mais cicatrizes de cesariana. Métodos: um estudo transversal incluiu 100 gestantes entre 13ª e 26ª semanas de gestação com duas cesarianas (CEs) anteriores que foram agendadas para interrupção da gravidez com uso de misoprostol. Os pacientes foram convenientemente designados para regimes de 100 µg/3 horas, 200 µg/3 horas ou 400 µg/3 horas. O desfecho primário foi o tempo para o aborto, os desfechos secundários foram efeitos colaterais e complicações. Resultados: foi encontrada associação significativa entre o número de cesáreas anteriores e o maior tempo até o aborto (p=0,01). Foi identificada associação altamente significativa entre idade gestacional mais precoce e maior tempo para abortar (p<0,001). Menores efeitos colaterais e complicações foram associados com 200 µg de misoprostol a cada 3 horas (p<0,001). O aborto incompleto foi a complicação mais frequente registrada para as doses sucessivas de misoprostol. Conclusões: o misoprostol é um medicamento eficaz em doses baixas para interrupção da gravidez em mulheres com duas ou mais cesarianas anteriores. Porém, sua segurança necessita de monitoramento do paciente no hospital para diminuir a morbimortalidade por trás de seu uso.
E-learning seeks to create an interactive learning environment between the teacher and the learner through electronic media conveying in more than one direction, regardless of how the environment and its variables are identified. It also develops skills necessary to deal with technology in order to be able to take into account the individual differences between them and helps e-learning teacher and learner to achieve the goals set in advance and identify educational objectives in a clear manner. The research aims to identify e-learning in its benefits and management systems. It has three sections dealt with in the current research. Chapter II concentrates on the research Methodology, which consisted of three sections: The first s
... Show MoreAbstract
Objective / Purpose: Online social relationships through the emergence of Web 2.0 applications have become a new trend for researchers to study the behavior of consumers to shop online, as well as social networking sites are technologies that opened up opportunities for new business models. Therefore, a new trend has emerged, called social trade technology. In order to understand the behavioral intentions of the beneficiaries to adopt the technology of social trade, the current research aims at developing an electronic readiness framework and UTAUT model to understand the beneficiary's adoption of social trade technology.
Design/ methodology/ Approach: To achieve the obje
... Show MoreAbstract:
This research aims to identify the type of cultural values prevailing in the Ramadi General Hospital, and Baghdad, educational, and whether the organization's culture values play a role in improving the quality of nursing care service in hospitals, and how different cultural values of the nurses between Ramadi Teaching Hospital and General education Baghdad Hospital because of the nature social and cultural Different each region, including the research sample of all nurses working in Baghdad Teaching Hospital, and Ramadi educational-General, adopted Find descriptive analytical approach adopted scale developer (Hofstede, 1991) and (Furrer et al, 2000) And pres
... Show MoreMarketing plays a role in the transfer of consumer desires through research, studies and satisfy the needs process, and with the technical development has evolved and marketing departments in the world of commerce has made great strides since the expansion of the trade deal, especially in light of spread of the Internet and the culture of use where he became a lot as individuals or institutions are dealings via electronic shopping . In all cases, we find that the consumer is important party, and that the legal rules did not leave the shopping process or contracting E without protection and I've dealt with so many studies through the civil protection for the consumer in electronic contracts legally with an analytical study of the
... Show MorePurpose: The main objective of this paper is, to determine the optimal no. of technicians’ men in a workshop crew of an Industrial System. Theoretical framework: The purpose of applying these tools is to explore their ability to reduce costs and improvements that can be obtained in the process of providing services to the end customer. Design/methodology/approach: The literature structure review was built from analyzing 12 of scientific papers and books, from web sciences and the Elsevier database. The papers were analyzed from descriptive, methodologic, and citation characteristics. Finding: By applying the equation model of the paper, the optimal no. of technician men in the crew of the workshop can be determined when
... Show MoreBackground: Patients who have both neurological impairment and kyphotic deformity can be treated medically, and this treatment can be achieved with anti-tuberculous drugs alone.
Objective: To evaluate conservative medical management of patients with tuberculosis of the spine (Pott disease). The prognostic significance of various clinical, radiological, and long-term follow-up findings in these patients was also evaluated.
Methods: Between January 2009 and January 2018 data were collected prospectively at The Neurosciences Hospital/ Baghdad/ Iraq in 44 patients with Pott disease in the thoracic and lumbar spine. These patients had no major neurological deficits or
... Show MoreRecord, verify, and showcase your peer review contributions in a format you can include in job and funding applications (without breaking reviewer anonymity).
One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,
... Show More