Background: Appendectomy is still one of the most commonly performed emergency surgical procedures worldwide.Avoiding delays in the diagnosis in these patients may play a role in reducing observed morbidity.Aim of study:To analyze the clinico-pathological profile and outcomes of patients undergoing emergency appendectomies to determine risk factors influencingcomplicaions.Type of the study: A prospective analytic studyPatients and Methods: The study involves 108 patients underwent emergency appendectomies at Al-kindy teaching hospital from April 2014 to March 2015. Appendicitis was categorized into two groups perforated andnonperforatedappendicities. A comparison between them was made in regard to Gender, Age, clinical presentation, investigations(White blood cells count), patient’s delay, hospital delay, anatomical location of the appendix, presenceof fecolith.Results: Five factors were predicted that influence appendicealrupture,the patient’s pre-hospital time delay was the most important risk factor for perforation. The male are slightly more affected than female in a percentage of (60male) 55.55% and (48female) 44.44%.The most common appendix anatomical location for complicated appendicitis was pelvic 16 out of 32 (50%).The presence of fecolith in the lumen of appendix was considered significant risk factor for perforation 23/32 (71.875%). In the perforated group 28patients out of 32had high White blood cells count(87.5%) compared to patients in the non-perforated group36 (47.39%).Conclusions:Young age group, male gender, pelvic anatomical location of the appendix ,presence of faecolith in the lumen of the appendix and prehospital time delay were found to be the most important risk factors
The research included making a bibliography of the jurisprudential books available in the reference section of the central library at the University of Al-Mustansiriya. From this research, and I also saw that one of its objectives was to classify these books scientifically according to what was included in the Contemporary Islamic Fiqh Library of sections that were classified on its basis, according to what has settled in the custom of contemporary jurists, and according to the researcher’s view and his humble diligence, so the research was organized into an introduction and three topics. Each topic contained approximately five demands that included the sections of the contemporary jurisprudential lib
... Show MoreThe presence of deposition in the river decreases the river flow capability's efficiency due to the absence of maintenance along the river. In This research, a new formula to evaluate the sediment capacity in the upstream part of Al-Gharraf River will be developed. The current study reach lies in Wasit province with a distance equal to 58 km. The selected reach of the river was divided into thirteen stations. At each station, the suspended load and the bedload were collected from the river during a sampling period extended from February 2019 till July 2019. The samples were examined in the laboratory with a different set of sample tests. The formula was developed using data of ten stations, and the other three s
... Show MoreSalah Al-Din Provence is an active agriculture and population region. One of its primary water sources is groundwater, which suffers from a lack of information regarding water quality and hydrochemistry. In order to study those missing variables, 27 samples from wells of shallow tubes were collected for analyzing the relevant physicochemical indices that help to produce the Schoeller index, Piper diagram, and Gibbs plot. Piper diagram revealed a hydrochemistry behavior of different values along with the groundwater samples. The chemistry of wells was controlled primarily by the evaporation process according to the Gibbs plot. The values of the Schoeller index of the studied samples stated that 59% of
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
This study was aimed to estimate off-farm labor supply model. Data were collected randomly from 267 wheat producers in Salah El-Din province for the year 2020, 67.4% of them are produced using pivot sprinklers for irrigation and with three tenure categories (60,80,12) dunums. Furthermore. The KS coefficient was used to analyze the producers' risk-taking behavior after estimating the production function and determining the area variable that has the most influence on the production process. If it increased by 1%, production would increase by 0.802%. The farmer's decision to adopt the technology was based on economic, social, and institutional factors. It turns out that 40% of farmers make their decision based on financing. When a
... Show MoreObesity and cancer are two major epidemics of this century. Obesity is related to a higher risk of many types of cancer. Studies have accessed circulating adipokines, as key-mediators in obesity and breast cancer. The study is aimed to examine the circulating levels of insulin-like growth factor-1, leptin, adiponectin, and resistin in premenopausal Iraqi women with breast cancer. The current study was performed during the period from June 2019 to December 2019 at Oncology unit/ Medical City Hospital-Baghdad. A total of 90 premenopausal women with BC/ stage II and III after 2nd dose of chemotherapy were contributed in this study as patients group. Their ages ranged from (35- 50) years in addition to 90 premenopausal healthy women wer
... Show MoreOrigination for Teaching Physics at Secondary Stage main of the Educational Aims
Over the last few decades, many instructors have been trying all kinds of teaching methods, but without benefit. Nevertheless, in the 1986, a new technique is appeared which called K-W-L technique, it is specified for reading comprehension passages because reading skill is not easy matter for students for specific purposes (ESP).therefore, the K-W-L technique is a good one for thinking and experiences. To fulfill the aims and verify the hypothesis which reads as follows" it is hypothesized that there are no significant differences between the achievements of students who are taught according to K-W-L technique and those who are taught according to the traditional method
... Show More