Background: Laparoscopic cholecystectomy has many difficulties which include port Insertion, Dissectionof the Calot’s Triangle , Grasping of the Gallbladder , Wall thickness, Adhesion and extraction of theGallbladder. Aim of the Study: To predict how difficult cholecystectomy will be from assessing the patientpreoperatively which, in turn, help in decreasing the risks on the patients and preventing post-operativecomplications. Patients and Methods: A prospective study conducted in the department of General Surgeryat Al-Ramadi Teaching Hospital for the period of nine months from 15th of May 2018 till the 15th of February2019. It included 60 patients, all of them were undergone laparoscopic cholecystectomy for Gallstone. Patientswith common bile duct calculus, dilated common bile duct, current attack of acute cholecystitis, those withabsolute contraindications to laparoscopic cholecystectomy, The data were collected prospectively to predictthe significance of association with patients’ characteristics. The time of operation was calculated from thefirst port site incision until the last port closure. All the intra operative events were recorded. Conversionsto open cholecystectomy were done by median or subcostal laparotomy according to the surgeon’s decisionand each patient’s condition. Results: In this study, the highest proportion of operations was categorizedas easy (58.3%), 28.3% of operations were considered difficult and 13.3% of them were very difficult. Asignificant association (P < 0.05) between operation difficulty and all of the following characteristics: Aging,obesity, history of previous biliary hospitalization, thickened bladder wall, pericholecystic collection, andlarge stones. Conclusions: The difficult laparoscopic cholecystectomy can be predicted preoperativelybased on number of factors, like: obesity, previous biliary admission, gall bladder wall thickness, ultrasoundfindings (stone size and pericholecystic fluid) and aging process, evaluating of such factors minimize thecomplications of laparoscopic cholecystectomy and conversion to the open procedure.
This work involves theoretical and experimental studies for seven compounds to calculate the electrons spectrum and NLO properties. The theoretical study is done by employing the Time Depending Density Functional Theory TD-DFT and B3LYP/high basis set 6-311++G (2d,2p), using Gaussian program 09. Experimental study by UV/VIS spectrophotometer device to prove the theoretical study. Theoretical and experimental results were applicable in spectrum and energy gap values, in addition to convergence theoretically the energy gap results from ΔEHOMO-LUMO and UV/VIS. spectrum. Consider the theoretical method very appropriate to compounds that absorb in vacuum UV.
The mysterious letters, the philosophy of existence and the meaning of these letters in the Qur'an is one of the mysterious issues that has always occupied the minds of Interpreters. Each Interpreter has tried to provide his own interpretation and understanding of these mysterious letters. Since these letters are part of the surah of the Qur'an and at the same time, the appearance of these letters, unlike other verses, does not indicate meaning, the commentators have approached these verses with their preconceptions. In this article, an attempt has been made to investigate the role of pre-interpreters of descriptors in a descriptive and analytical method in finding the meaning of syllables. However, each of them has tried to interpret th
... Show MoreThe research aims to show the relationship between the use of automated accounting systems technology and its impact on enhancing the efficiency and effectiveness of the internal control system in a sample of Bahraini universities in light of the rapid changes in the electronic business environment. Automated accounting and its impact on enhancing the efficiency and effectiveness of the internal control system, and it is concluded through the analytical study of the research sample that there is a percenta
... Show MoreThe urban Gentrification is an inclusive global phenomenon to restructure the cities on the overall levels, the research to propose a specific study about the concept of urban Gentrification in the cities and showcasing its, specifications, and results, and how to deal with the variables that occur on cities through improvements as part of urban renewal projects, then the general axis of the research is shrinked, choosing the urban centers as the most important areas that deal with the urban Gentrification process due to its direct connection with indivisuals and social changes, and to process the specific axis of the research theses and studies will be showcased that discuss the topic in different research directions, and emerged
... Show More
... Show MoreConducted two trials separate plants Defla first two seasons, 1998 and 1999 to test the susceptibility Altgveria three varieties including Azharha colored white and pink Qati and pink Qtmr and second seasons 1999 and 2000, two types color Azhaarhama white and pink Qati treated mind half-timbered two types of Alaoxinat IBA and NAA and three concentrations as well as repeatersAdhrt results low Almaah rooting
In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.