Twisted Ovarian Mass in Pregnancy
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 1
Abstract
"ABSTRACT A 20 yr. old patient, referred from Gujarat Cancer Research Institute as a case of 2MA with complex ovarian mass with CA125: 520 U/ml with Complaintsof:Right lower abdominal pain and swelling of abdomen for the last 5 days. USG PELVIS:SLIUF,CRL: 13mm = 7wks 3d, Complex right adnexal mass of 13*10 cm size with foci of calcification suggestive of ruptured large dermoid cyst. Patient was taken for Exploratory Laparotomy under spinal anaesthesia. Per op:Twisted right adnexal mass, necrotic and oedematous in nature. Biopsy report: Mature benign cystic teratoma. Post op: Patient was stable, given injectable antibiotics and progesterone support and discharged on 8th postop day after Stich removal with RANC and called for follow up after 15 days. Follow up:Patient was healthy follow up USG done suggested appropriate growth. CONCLUSION: Twisted ovarian mass is an emergency. It has to be operated as soon as possible. Emergency laparotomy followed by Tumour mass removal was done. Patient was explained about the risk of abortion and informed consent taken. Progesterone support was given to prevent risk of abortion.Dermoid cyst is a benign condition. In emergency it mostly Presents as rupture or twisted mass. "
A Newton’s Method for Nonlinear Unconstrained Optimization Problems with Two Variables
In this paper a modification of the classical Newton Method for solving nonlinear, univariate and unconstrained optimization problems based on the development of the new variants is presented. Moreover it focuses on the...
A Study: Cryptology Techniques and Methodologies
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in curr...
Public Key Encryption : A Survey
Public key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public. Although different, the two parts of the key are mathematically linked. Public key...
Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption
Abstract: Metamorphic cryptography is the inconsistency between of cryptography and steganography. This combination will be used for the higher level of security has gained a lot of importance. Cryptography refers to the...
Cone Beam Computed Tomography in the Diagnosis of Chronic Apical Periodontitis and Clinical Decisions: A Review
A major paraclinical diagnostic method for the early and late follow-up of the healing process in chronic periapical lesions is the two-dimensional radiographic technique. About 32% of the periapical lesions are detected...