Background: Injuries to blood vessels are among the most dramatic challenges facing trauma surgeons because repair is often urgent, the surgeon has to decide between management options (open or endovascular), and gaining control and reconstructing a major arterial injury can be technically demanding .
Objective:,To analyze the cause of injury, surgical approach, outcome and complications of axillary artery injuries.
Methods A descriptive cross-sectional study on fifty patients at Ibn-Alnafees hospital in Baghdad from January 2005 to December 2010
Results Males were more commonly affected than female with ratio of 6.1:1. Most injuries were caused by bullet and shell (84%), followed by stab wounds (10%) and blunt trauma (6%). Patients were divided into three groups according to the involved part of the axillary artery: the first part, the second part and the third part. The second part represents most of the cases (48%), the third part account for (30%), while the least is the first part (22%). Resection and end to end anastomosis was done in 80% of the cases, lateral repair in 8%, graft interposition in 8 % and ligation in 4%.
Conclusion: The outcome of the injury in this study was in general good. The morbidity of the patients due to nerve injury and wound infection still problem. Mortality due to associated injury and delayed presentation was 4% which is acceptable as compared with other studies.
Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co
... Show MoreAlongside the development of high-speed rail, rail flaw detection is of great importance to ensure railway safety, especially for improving the speed and load of the train. Several conventional inspection methods such as visual, acoustic, and electromagnetic inspection have been introduced in the past. However, these methods have several challenges in terms of detection speed and accuracy. Combined inspection methods have emerged as a promising approach to overcome these limitations. Nondestructive testing (NDT) techniques in conjunction with artificial intelligence approaches have tremendous potential and viability because it is highly possible to improve the detection accuracy which has been proven in various conventional nondestr
... Show MoreThe occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreTrue random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules
This review paper examines the crucial impact of YouTube on learning English as a Foreign Language. Recently, learners’ interaction and development of their skills have been improved due to the integration of digital platforms into language education. YouTube is regarded as one of the most prevalent platforms due to its accessibility, multimodal content, and capacity to simulate real-life communication. This study tackles thirty selected research articles from various cultural and institutional backgrounds to identify the pedagogical benefits and challenges associated with using YouTube in teaching English. Conventional methods of teaching English as a foreign language encounter difficulties in improving students’ engagement and
... Show MoreThis current research deals with the "The role of organizational change in the achievement of strategic success" Who are getting increased attention to being one of the important topics and relatively new, And which have a significant impact on the future of the organization So there is a need for this research, which aims to identify the role of organizational change across dimensions (technology, organizational structure, human resources, organizational culture) in the strategic success through its components (a specific strategy, effective implementation, innovation, customer satisfaction)، And that by two main hypotheses, branched about eight hypothes
... Show MoreBackground: There are so many evidences that there was antimicrobial resistance, and there were many strains that emerged which were difficult to treat. We are living in a situation that the dissemination of multiple drug resistant bacteria can lead us to the situation, in which no treatment could be offered for bacterial infection in future.
Aim of study: Assessment of nurses’ knowledge, attitude, and practices on antibiotic use and resistance in Fatima Al Zahra hospital in Baghdad.
Subjects and Methods: A cross-sectional study. The study was carried on from 1st of February to 31st of March 2021. A questionnaire was constructed by the research team based on literature review and was adapted to asses
... Show MoreBackground: The study was designed to evaluate the effect of local application of exogenous VEGF/collagen I separately and as a combination in socket healing. Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1st molar of both sides (right side was considered as experimental site, while left be the control one, treated with 1µL of normal saline). The rats were scarified at 3, 7, 14, 28 days post extraction. Socket healing was histologically examined with immunohistochemistochemical localization of ALP&FGF2. Materials and Method: Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1stmolar of both sides (right side was considered as experimental site, while left be the
... Show More