Background: Penetrating neck injuries are common problem in our country due to increasing violence, terrorist bombing and military operations.
These injuries are potentially life threating and need great attention and proper management.
Objective: The aim of this study is to focus on the importance of anatomical zonal classification of the neck in the management of penetrating injuries of the visceral compartment of the Neck.
Methods :70 patients with various injuries who were managed at causality unit and Otolaryngology department in Al-Kindy Teaching Hospital during aperiod from January 1st 2015 to October 31st 2015.
The study carried on those patient depending on proper clinical examination and their urgent management.
Results : Both civilian and military patients were admitted to the hospital, 34 patients (47.2%) in their 20s age group, while only 2 (2.8%) in 60s.
High percentage of penetrating neck injuries in zone , 48 patient (68.6%) and lowest in zone , 6 patients (8.5%).
40 patients (57.1%) presented with tracheal and laryngeal injuries and 12 patients (17.5%) were with pharyngeal injuries, 4 patients (5.7) were with recurrent laryngeal nerve injury and 13 patients (18.5%) presented with vascular injuries.
Radiological examination done for 53 patients (75%) and we found foreign bodies in 30 patients (56.6%), tracheal deviation in 4 patients (7.5%) and emphysema in 19 patients (35.8%).
Tracheostomy done in 51 patients (72.8%) neck, exploration in 20 patients (28.5%) and a 9 patients (12.8%) treated conservatively.
Conclusion: Zonal classification of penetrating neck injuries was helpful in the management. Our study explains demographics and location of the injuries. Young men involved in violence and bombing was at high risk.
Zone with involvement of trachea, larynx and pharynx were most common areas of injuries.
Recommendations
Anatomical zone classification should be used as a guideline in management of penetrating neck injuries. (Trauma lifesaving guideline).Tracheostory should be practiced by every doctor in casualty unit. Team of surgeons and anaesthiologist should be always ready for any intervention with patient present to the casualty unite with a penetrating neck injury. Emergency medicine medical practice must be presents in every casualty unit to deal with insults.
Aim of the study
1.To recognize penetrating injuries of the neck according to the anatomic neck zones.
2.Identify the outcome of their treatment
Abstract
The term public budget defects became nowadays a chronic, economical phenomenon, almost all the countries weather advanced or development country suffered from it, despite the different visions to economic schools of a thought to accept or reject the deficit in public budget but the prevailed opinion that is needed to rule the role of the state by reducing the public spending which led to continuous deficits in public budget and the consequent upon increase in government borrowing, increase taxes on income and wealth, thus weakening the in contrive for private investment which contributed to the increase of in flationary stagnation, it became a duty to state covered by the lack of financial sources
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show MoreThe need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreThe efficiency of management is determining factor for the success or failure of agricultural projects generally and Livestock particularly achieving its objectives. Therefore, this research came to diagnose the most important variables that determine the efficiency of management using the probability regression models to measure the probability of management efficient of broilers production projects using random sample included (60) broilers projects represented 11.6% of Baghdad province (research community) in 2016. After estimating the relationship between the management efficiency (descriptive dependent variable) and the independent variables affecting it (age, educational level, production index (PI), experience). The results
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreCo-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show More