خلفية البحث: المتلازمة الأيضية عند المرضى العراقيين المصابين بالمتلازمة التاجية الحادة قليلا ما تمت دراستها. الأهداف: دراسة الخصائص المجتمعية-السكانية للمرضى العراقيين المصابين بالمتلازمة الايضية مع المتلازمة التاجية الحادة. المرضى وطرق العمل: شملت الدراسة المقطعية 150 مصابا بالمتلازمة التاجية الحادة الذين يعالجون في وحده العناية القلبية في مستشفى اليرموك التعليمي في بغداد للفترة من منتصف كانون الثاني إلى شهر تموز، عام 2011) تم جمع المعلومات باستخدام إستمارة صممت لهذا الغرض تملأ من خلال مقابلة المرضى بأنفسهم أو أقاربهم. واعتمد تشخيص الطبيب الاستشاري المعالج في تصنيف الحالات. النتائج: بلغت نسبة المتلازمة الأيضية بين مرضى المتلازمة التاجية الحادة 69.3%، 63.8% بين الذكور و 78.6% بين الإناث إلا أن الفرق بدون دلالة إحصائية. وكانت أعلى نسبة بين الفئة العمرية (50-59 سنة). كانت الفروقات مابين الجنسين عند المصابين بالمتلازمة الايضية ذات دلالة إحصائية بخصوص مكان السكن (حضري: 63.3% ذكور، 84.1% أناث)، المستوى التعليمي (الأمية: 15% ذكور، 52.3% أناث، التعليم العالي: 25% ذكور، 4.5% أناث)، وطبيعة العمل (موظف: 50% ذكور، 22.7% أناث). كانت إصابة الذكور المصابين بالمتلازمة الأيضية مع المتلازمة التاجية الحادة بالجلطة القلبية (80%) أكثر من الذبحة الصدرية غير المستقرة، وكان العكس عند الاناث (41% جلطة قلبية) وكان الفرق ذا دلالة إحصائية. الإستنتاجات: هناك مستوى إنتشار مرتفع للمتلازمة الأيضية عند العراقيين المصابين بالمتلازمة التاجية الحادة ومن بين هؤلاء كانت الإصابة بالجلطة القلبية أكثر عند الذكور بفرق ذو دلالة احصائية.
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe influence and hazard of fire flame are one of the most important parameters that affecting the durability and strength of structural members. This research studied the influence of fire flame on the behavior of reinforced concrete beams affected by repeated load. Nine self- compacted reinforced concrete beams were castellated, all have the same geometric layout (0.15x0.15x1.00) m, reinforcement details and compressive strength (50 Mpa). To estimate the effect of fire flame disaster, four temperatures were adopted (200, 300, 400 and 500) oC and two method of cooling were used (graduated and sudden). In the first cooling method, graduated, the tested beams were leaved to cool in air while in the second method, sudden, water splash was use
... Show MoreThe dynamic behavior of laced reinforced concrete (LRC) T‐beams could give high‐energy absorption capabilities without significantly affecting the cost, which was offered through a combination of high strength and ductile response. In this paper, LRC T‐beams, composed of inclined continuous reinforcement on each side of the beam, were investigated to maintain high deformations as predicted in blast resistance. The beams were tested under four‐point loading to create pure bending zones and obtain the ultimate flexural capacities. Transverse reinforcement using lacing reinforcement and conventional vertical stirrups were compared in terms of deformation, strain, and toughness changes of the tes
The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show MoreThe effect of three ionic liquids viz., 1-hexyl-3-methylimidazolium tetrafluoroborate (ILE), 1-hexyl-3-metylimidazolium hexafluorophosphate (ILF) and 1-octyl-3-methylimidazolium tetrafluoroborate (ILG) when used as surfactants on the performance of dissolved air floatation (DAF) was investigated.
Experiments were conducted at a temperature of 30-35 ºC, 10ppm ferric chloride as coagulant, 50% recycle ratio, pH 8, and 10 minutes treatment time to find oil and grease (OG) and turbidity removal efficiencies at saturation pressure (2-6) bar.
ILs were used at concentration of 50 µl/liter of treated water in two positions in DAF system; the saturation vessel and the treatment tank. The performance using ILs
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those methods i
... Show MoreThe university course timetable problem (UCTP) is typically a combinatorial optimization problem. Manually achieving a useful timetable requires many days of effort, and the results are still unsatisfactory. unsatisfactory. Various states of art methods (heuristic, meta-heuristic) are used to satisfactorily solve UCTP. However, these approaches typically represent the instance-specific solutions. The hyper-heuristic framework adequately addresses this complex problem. This research proposed Particle Swarm Optimizer-based Hyper Heuristic (HH PSO) to solve UCTP efficiently. PSO is used as a higher-level method that selects low-level heuristics (LLH) sequence which further generates an optimal solution. The proposed a
... Show More