Background: Ruptured uterus is a catastrophic event to both
mother and her fetus. Apart from maternal and fetal mortality
rates, the incidence of rupture of uterus is often taken as an
index of the standard of obstetric care.
Objective: To determine the frequency, causes, management
outcome of ruptured uterus at Al Batool maternity hospital.
Method: The study was conducted in the department of
obstetrics and gynecology at Al Batool maternity hospital
Mosul-Iraq over a period of three years from October 1st 2002
to August 30th 2005. All the cases of uterine rupture presented
during the study period were recorded and managed in the
department. Data was recorded on designed forms.
Results: Thirty nine cases of ruptured uterus out of 44539
deliveries were registered, the incidence was 0.087%. Age
ranged from 15 to45 years. The majority of the patients were
grandmultipara (Para 5 and above), but 7 of the patients were
nulliparous women (17.94%). 26 ruptures (66.66%) occurred
in unscarred uterus and 13 ruptures (33.33%) occurred in
scarred uterus, cephalopelvic disproportion and obstructed
labor were the cause of rupture in 11 cases (28.2%), in
addition to the mentioned causes 11 cases of the uterine
ruptures we registered in our study (28.2%) were mishandled
by the traditional birth attendants, and in 14 cases (35.89%)
there was injudicious use of oxytocin. We had three maternal
deaths (7.69%) out of 39 patients, and only 10 fetuses out of
39(25.64%) were alive.
Conclusion: Rupture uterus is still an important cause of
maternal and perinatal mortality and morbidity in Iraq, it is
not always suspected, and hence increased vigilance is vital.
Further studies may help in the development of preventive
strategies and ensure prompt management to reduce maternal
and perinatal mortality and morbidity
A field study aimed at identifying the reality of the application of strategic management in the colleges of education/ University of Baghdad. The research adopted the descriptive analytical approach. The research community, consisting of 801 faculty teachers, has been identified. The research sample was selected in a simple random way and represented 15% of the research community, totalling 124 teaching members. A questionnaire was constructed that included (46) items divided between areas (strategic objectives, strategy planning and formulation, implementation of the strategy, and evaluation of the strategy). The honesty and consistency of the tool was verified. The researcher analyzed the research data using SPSS. The most important resu
... Show MoreThis research explores the intricate relationship between environmental sustainability and urban design in Al-Jumhuriya Neighborhood, Baghdad, reflecting urban development challenges and opportunities. It highlights the need to balance growth, functionality, and quality of life with environmental responsibility in urban areas worldwide. The research includes a literature review on environmental sustainability in urban design and the utilization of multifunctional land in contemporary cities. The research employs a mixed-methods approach, combining quantitative and qualitative data collection methods. Survey results show a diverse range of perspectives, indicating concerns about air quality and local regulations but also positive views on co
... Show MoreBackground: Teachers are considered as dynamic force who take a pivotal position in any educational system. Since they may play a significant role in passing the preventive information and health promotion, it is important that their own oral health knowledge, attitude, and practices conform to the professional recommendations. The aim of this study was to evaluate oral health knowledge, attitude and practices among kindergarten teachers, and their impact on teachers’ oral health condition in Al-Rusafa Sector, Baghdad, Iraq. Materials and Methods: This cross-sectional survey was conducted among 80 kindergarten teachers. A self-administered questionnaire was distributed among these teach¬ers. This questionnaire format contains two
... Show MoreAn optimization study was conducted to determine the optimal operating pressure for the oil and gas separation vessels in the West Qurna 1 oil field. The ASPEN HYSYS software was employed as an effective tool to analyze the optimal pressure for the second and third-stage separators while maintaining a constant operating pressure for the first stage. The analysis involved 10 cases for each separation stage, revealing that the operating pressure of 3.0 Kg/cm2 and 0.7 Kg/cm2 for the second and third stages, respectively, yielded the optimum oil recovery to the flow tank. These pressure set points were selected based on serval factors including API gravity, oil formation volume factor, and gas-oil ratio from the flow tank. To impro
... Show MoreThe present study is an attempt to show how the three Umayyad poets ; Jarir , Al-
Farazdaq and Al-Akhtal have consciously and skillfully employed in their poetry som ancient
Arab legends ,historical events and wars as they provide atrue image of the values and
customs of the peoples who lived before them .
Their employed , how ever, takes avarying degrees depending, to alarge extent , an the
vast but personal knowledge of each poet the past tradition , and practices . Jarir ,in many
respects out , stands the first , Al-Farazdaq , the second and Al-Akhtal , the third .
The present study is an academic attempt to show how the threeUmayyad poets ; Jarir ,
Al-Farazdaq and Al-Akhtal have skillfully employed old conventions and traditions in their
poetry to serve a dual purpose of making their ideas striking , memorable and compelling and
of reaching eminence as poets.
The primary aim of the poets has been to amuse , convince and influence the readers or
listeners of their poetry . as it were, a mirror image of the social , religious and historical
beliefs , values and customs which prevailed throughout the ages before the emergence.
To track scientific developments and achievements, for example, that (achieved) after the Second World War until this moment, make each of us in absolute amazement. He invented the computer, discovered the genetic factor (DNA), and discovered the drawing of the human genetic map, going up to the moon, penetrating outer space by satellites, getting close to distant planets, producing jet planes, microprocessors, and lasers, in addition to enabling a person to create a layer of The material is extremely thin and extremely imaginative. It has also become possible for a person to "dig lines that do not exceed 20 billion meters of thickness." The human being was also able to collect things an atom and build an efficient and high-precision con
... Show MoreThe study aims to identify the reality of the use of educational technology in the teaching of mathematics from the point of view of mathematics teachers in Amman, where the researcher used the descriptive survey method. The sample included (67) female teachers working in public schools in Amman. In order to achieve the objectives of the study, the researcher used the questionnaire as a tool to collect data. The study concluded that many educational techniques are not available from the point of view of the study sample. Mathematics teachers also found that there are many obstacles that prevent the use of educational techniques in schools, most notably the lack of courses offered to teachers on the use of teaching techniques in teaching
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More