Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had a sensitivity of (93.5%), specificity of (70.0%) and accuracy of (90.3%) compared with coronary angiography. Conclusion: Speckle-tracking echocardiography technique has a good performance and validity in detection of coronary artery stenosis with good agreement with angiography.
HR Al-Hamamy, AA Noaimi, HA Salman, NAA Jabbar, American Journal of Dermatology and Venereology, 2013
Coronary heart disease (CHD) is the leading cause of death in United State (U.S.). Controlling of modifiable risk factors such as smoking, hypertension (HT), diabetes mellitus (D.M.), dyslipidemia, physical inactivity & obesity will prevent other serious cardiovascular complications
Variation in DNA, and genes to a lesser or greater extent, can play an important role in most diseases; that is because this variation in will reflect and affect the function of DNA, and genes (combined genes and DNA or separately). This can be affected by environment, life style, as well as the inheriting from parents and previous generations. All these factors can contribute in human diseases. There are different alterations in genes, like imbalance and inequality in chromosomes, disorder in gene (deficiency in gene, which could be complex or single disorder), and cancer. In the last decades, scientists were focus on medicine and genetics; they pay an extensive attention to reach better understanding about diseases and their cause
... Show MoreBackground: Hyperthyroidism occurs due to over production of thyroid hormones, one types of hyperthyroidism was Graves, disease. Hyperthyroidism is characterized by high level of serum thyroxin, triiodothyronine and low level of thyroid stimulated hormones. Material and Methods: fifty two hyperthyroid patients, thirty patients under treatment with carbimazole and other twenty two patients under treatment with radioactive iodine, and sixty healthy control group. The average salivary flow rate was calculated as ml/5mint.The concentration of calcium, potassium, and total protein were determined in the salivary supernatant sample. This is done through different biochemical tests. Determination of salivary IgA is done by ELIZA. Results: The most
... Show MoreBackground: Cardiovascular disease (CVD) is an important complication of type 2 diabetes mellitus (T2DM). Oxidative stress plays a major role in the development of CVD. Saliva has a diagnostic properties aiding in the detection of systemic diseases. This study aimed to assess the association between salivary oxidative stress markers and the risk of vascular disease (VD) in T2DM patients. Materials and Methods: One hundred T2DM patients and fifty apparently healthy males were enrolled in this study. Saliva sample was collected for assessment of oxidative stress markers including: lipid peroxidation plasma thiobarbituric acid-reactive substances (TBARS), uric acid (UA) and total antioxidant capacity (TAC) levels. Arterial stiffness index (ASI
... Show MoreThe major goal of this research was to use the Euler method to determine the best starting value for eccentricity. Various heights were chosen for satellites that were affected by atmospheric drag. It was explained how to turn the position and velocity components into orbital elements. Also, Euler integration method was explained. The results indicated that the drag is deviated the satellite trajectory from a keplerian orbit. As a result, the Keplerian orbital elements alter throughout time. Additionally, the current analysis showed that Euler method could only be used for low Earth orbits between (100 and 500) km and very small eccentricity (e = 0.001).
In this paper, we present new algorithm for the solution of the nonlinear high order multi-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the semi-analytic technique and the solutions are calculated in the form of a rapid convergent series. It is observed that the method gives more realistic series solution that converges very rapidly in physical problems. Illustrative examples are provided to demonstrate the efficiency and simplicity of the proposed method in solving this type of multi- point boundary value problems.
In this work, the antibacterial effectiveness of face masks made from polypropylene, against Candida albicans and Pseudomonas aeruginosa pathogenic was improved by soaking in gold nanoparticles suspension prepared by a one-step precipitation method. The fabricated nanoparticles at different concentrations were characterized by UV-visible absorption and showed a broad surface Plasmon band at around 520 nm. The FE-SEM images showed the polypropylene fibres highly attached with the spherical AuNPs of diameters around 25 nm over the surfaces of the soaked fibres. The Fourier Transform Infrared Spectroscopy (FTIR) of pure and treated face masks in AuNPs conform to the characteristics bands for the polypropylene bands. There are some differences
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the