Preferred Language
Articles
/
BRffjZIBVTCNdQwCm7fj
Novel anticoagulants in the management of atrial fibrillation: A comprehensive comparative analysis
...Show More Authors

Background: Atrial fibrillation (AF) stands as the most prevalent cardiac arrhythmia, with associated risks of stroke and systemic thromboembolism. While vitamin K antagonists, specifically warfarin, have historically been the mainstay for stroke prevention in AF, they come with inherent limitations.

Aim: This review seeks to offer a comprehensive analysis of the efficacy, safety, and clinical advantages of novel oral anticoagulants (NOACs) compared to traditional warfarin in AF management.

Method: A meticulous examination of pivotal clinical trials, meta-analyses, and recent research publications was conducted. Four NOACs, namely Dabigatran, Rivaroxaban, Apixaban, and Edoxaban, were compared against warfarin, focusing on parameters like stroke prevention, risk of bleeding, patient compliance, and drug interactions.

Results: NOACs, as a collective group, demonstrated a comparable or superior efficacy profile in stroke prevention compared to warfarin. They also showcased a more predictable therapeutic range, fewer drug and food interactions, and, in certain cases, a better safety profile. The challenges associated with frequent monitoring and dose adjustments inherent to warfarin therapy were notably absent with NOACs.

Conclusion: NOACs present a robust alternative to warfarin for AF management, demonstrating comparable efficacy and, in certain aspects, heightened safety and practicality. However, the choice of anticoagulant should remain individualized, taking into account patient-specific factors and clinician expertise.

Crossref
View Publication
Publication Date
Thu Sep 15 2022
Journal Name
Alustath Journal
Semantic Analysis of Proverbs: A Conversation Analysis
...Show More Authors

Proverbs are considered as a major source of ancient events and happenings. Similar to other past events related to life, proverbs have many important and famous values in people's life. This study will shed lights on the use of proverbs as short sentences based on long experiences. The aim of the study is to explicate the roles, and the importance of proverbs in our life and how they are used to convey thoughts to people throughout simple words with denotation. Thus, proverbs explicate the truth and experience of our grandfathers when directed for criticism. Few proverbs were used by writers to criticize, mimic and reprint their personalities. Hence, proverbs will achieve portions of the unique roles of understanding. The model to

... Show More
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Comparative Analysis of the Fatty Acid Pattern of Silybum marianum with Nigella sativa by Gas Chromatography-Mass Spectrometry
...Show More Authors

Many studied were conducted to evaluate the antihepatotoxic and antioxidant activities of Silybum marianum and proved these actions. The Naturally grown seed in Iraqi-Kurdistan Region also were studied for its chemical contents and biological activities. Vegetable oils occur in various plant parts mainly concentrated in the seeds.

In this study comparison was made between the fatty acid patterns of two plant seeds, Silybum marianum and Nigella sativa. Seed sample of Silybum marianum and Nigella sativa were exposed for extraction and isolation of the fatty acid contents using two different solvents (petroleum ether and n-hexane) at 60-80oC using soxhlet apparatus and the oily extract

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Analysis of the clause relations in the presidential presuasion in a war against Iraq
...Show More Authors

0

View Publication Preview PDF
Publication Date
Wed Oct 05 2022
Journal Name
Journal Of Basic Science
Loss in the Translation of Colour Euphemstic Expressions in the Qur’an: A Pragmatic Analysis
...Show More Authors

Publication Date
Tue Dec 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Stem cells a novel approach to periodontal regeneration (A review of literature)
...Show More Authors

In this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.

View Publication Preview PDF
Publication Date
Mon Mar 03 2014
Journal Name
Journal Of Baghdad College Of Dentistry
Stem Cells a Novel Approach to Periodontal Regeneration: A Review of Literature
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Lambert
The concept of Evil in J.R.R.Tolkien Novel Lord of the Rings
...Show More Authors

Evil pervades the narrative scene in Tolkien. Hence; his major themes in The Lord of the Rings are shown to be the Evil Nature of Power, the Tyranny of Technology and War as a Destructive Agent. Evil is not as powerful as good. The Boethian conception of evil comes through evil beings such as Melkor Morgoth in The Silmarillion or Sauron ,who cannot do good things but only pervert or mock things; In The Lord of the Rings; Tolkien seems to suggest that there is no absolute evil. The other conception of evil is the Manichaen, a conception which receives more emphasis in Tolkien's trilogy and which sees the world as a battle-ground for warring forces of good and evil. Tolkien frequently personifies the Ring as if it were acting with a will of i

... Show More
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
A comparative taxonomic study of nutlets of Stachys L. in Iraq
...Show More Authors

Nutlets of 22 taxa of Stachys (13 species and seven subspecies and two varieties), representing seven of the currently recognized sections distributed in northern Iraq were examined by light microscope. The basic shape of nutlets in most taxa studied is Obovoid, but Oblong also found in S.megalodanta Hausskn.& Bornm. ex P.H.Davis, S.setirefa C.A.Mey. subsp daenensis (Gandog.) Rech.f.and S. kurdica Boiss.& Hohen. var.kurdica, while the Subgloboid shape found in S. iberica M.Bieb. and S. inflata Benth., more over the Broad triangular shape was found in S. nephrophylla Rech.f. and S.lanigera (Bornm.) Rech.f.., the biggest size of nutlets was found in S.inflata L. and the smallest was in S.melampyroides Hand.-Mzt. Regarding sculpturing pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref