Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had a sensitivity of (93.5%), specificity of (70.0%) and accuracy of (90.3%) compared with coronary angiography. Conclusion: Speckle-tracking echocardiography technique has a good performance and validity in detection of coronary artery stenosis with good agreement with angiography.
Variation in DNA, and genes to a lesser or greater extent, can play an important role in most diseases; that is because this variation in will reflect and affect the function of DNA, and genes (combined genes and DNA or separately). This can be affected by environment, life style, as well as the inheriting from parents and previous generations. All these factors can contribute in human diseases. There are different alterations in genes, like imbalance and inequality in chromosomes, disorder in gene (deficiency in gene, which could be complex or single disorder), and cancer. In the last decades, scientists were focus on medicine and genetics; they pay an extensive attention to reach better understanding about diseases and their cause
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Objectives: This study aimed to identify and analyse ATP7B variants in Iraqi adults with Wilson disease (WD) by long-read next-generation sequencing. Methods: This cross-sectional study was conducted at the Poisoning Consultation Center at Ghazy Al-Hariri Hospital for Surgical Specialties and the Gastroenterology Consultation Clinic at Baghdad Teaching Hospital, Medical City in Baghdad, Iraq. Unrelated patients with clinical and biochemical features suggestive of WD were recruited between October 2022 and October 2023. DNA was extracted from peripheral blood samples. Variants in the ATP7B gene were identified using long-read next-generation sequencing and then analysed by in-silico tools. Results: A total of 45 patients were recruited in
... Show MoreThe success of endodontic therapy is relied on radicular system cleaning, shaping, elimination of micro-organisms, and three dimensional filling of the radicular complex.This study was conducted to develop and assess new root canal sealer incorporating nano-sized bioactive glass into Gutta Flow II. The following concentration was used depend on a pilot study included adding (3%) of 45S5 bioactive glass into the Gutta Flow II. These materials were tested through assessment bioactivity. bioactivity test was undertaken after immersion of the tested samples into PBS for three days, seven days, fourteen days, and twenty eight days using FTIR too. study was found that it’s peaks was appear at level 800-1000 cm-1. The results showed that GFII gr
... Show MoreIn this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.
The aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreAbstract
Value Added Tax (VAT) is one of the most important types of indirect taxes because of its advantages in achieving financial, economic and financial objectives. The introduction of VAT is part of the reform of the structure of the Lebanese public tax system aimed at reducing the fiscal deficit and resulting inflation, which still lacks a general consumption tax. There is also an urgent need to increase treasury revenues , Because of its broad tax base, as it imposes on the consumption of locally produced and imported goods, in addition to the role played by this tax in support of the local product &nbs
... Show MoreThis paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonli
... Show MoreIn this work, the antibacterial effectiveness of face masks made from polypropylene, against Candida albicans and Pseudomonas aeruginosa pathogenic was improved by soaking in gold nanoparticles suspension prepared by a one-step precipitation method. The fabricated nanoparticles at different concentrations were characterized by UV-visible absorption and showed a broad surface Plasmon band at around 520 nm. The FE-SEM images showed the polypropylene fibres highly attached with the spherical AuNPs of diameters around 25 nm over the surfaces of the soaked fibres. The Fourier Transform Infrared Spectroscopy (FTIR) of pure and treated face masks in AuNPs conform to the characteristics bands for the polypropylene bands. There are some differences
... Show MoreMultiplesclerosis(MS)isachronic,inflammatory,immune-mediateddiseaseof the central nervous system (CNS). More than 2 million people worldwidehave MS. The goal of the present study was to compare Iraqi patients' treat-ment satisfaction with three different disease-modifying therapies (DMTs),administeredorally,subcutaneously,andbyslowinfusion;namely,fin-golimod, interferon beta-1b (IFNβ-1b), and natalizumab, respectively. Aswell as to assess the individual differences among these therapies about theireffectiveness, convenience and global satisfaction also to assess the role ofcertain predictors on treatment satisfaction. Patient satisfaction with medi-cation assessed by the Treatment Satisfaction Questi
... Show More