Our aim was to investigate the changes in the myocardium stiffness index for patients suffering from systemic hypertension, and to assess their left ventricular performance. We studied 263 hypertensive patients and 166 healthy subjects as a control group. By using conventional Doppler echocardiography, the following parameters were measured—Left ventricular end diastolic diameter, left ventricular end systolic diameter, transmitral early velocity, isovolumic relaxation time, and isovolumic contraction time. Tissue Doppler imaging (TDI) was used in the measurements of the early mitral annular velocity (Ea) and the diastolic stiffness was obtained by calculating the ratio E\Ea\LVIDd. Index myocardial performance (IMP) was calculated according to following equation (IVCT + IVRT)/ET for both the control group and hypertensive group. Results reveal that the differences in the average value of transmitral early filling velocity (E) between patients and control groups for age range (20 - 49) and (50 - 80) were (−1.91%) and (−3.69%) respectively with p value >0.05 for both groups, and the changes in LVIDd between patients and control groups were 0.42% and 1.29% for age ranges (20 - 49) and (50 - 80) respectively with p value >0.05 for both age groups. A significant difference in IMP between patients and controls has also been observed and the changes were 29.54% and 30.43% for age range (20 - 49) and (50 - 80) respectively with p value <0.05 for both groups. The mean values for E/Ea ratio and for the measured LV stiffness index were significantly higher in hypertensive patients compared with control group (p value < 0.05) for both age groups. In conclusion, LV myocardial diastolic stiffness index and IMP are increased in hypertensive patients.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreMultilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreWith the increasing rates of cancer worldwide, a great deal of scientific discourse is devoted to arguments and statements about cancer and its causes. Scientists from different fields try to seize any available chance to warn people of the risk of consuming and exposing to carcinogens that have, unfortunately, become essential parts of modern life. The present paper attempts to investigate the proximization strategy through which scientists construct carcinogen risk to enhance people’s preventive actions against these carcinogens. The paper targets the construction which depends on producing the conflict between the values of the people themselves and the contrasting values assigned to carcinogens. To achieve this aim, Cap’s (2
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me