Objectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a piezoelectric pressure sensor and asimultaneous Lead I electrocardiogram. Endothelial dysfunction (ED) was induced by oscillatory and retrogradeshear rates. The correlation between variables was calculated in Excel running on the Windows operating system.Results: There were 10 second-year medical students with mean age 22±0 years and mean body mass index25.7±4.8kg/m2. During reactive hyperaemia, pulse transit time was significantly increased by 3-5% in both normalendothelium and experimentally induced endothelial dysfunction relative to the pre-occluded artery, and thedifference was not significant (p>0.05). Digital pulse wave amplitude increased significantly in normal endotheliumrelative to the pre-occluded artery (p<0.05), but not in experimentally-induced endothelial dysfunction (p>0.05).Conclusion: The pulse transit time and digital pulse wave amplitudes of the photo plethysmography signal may beused to detect changes in vessel wall diameter and tone throughout the reactive hyperaemia process. Digital pulsewave amplitude was better able to detect experimentally-induced endothelial dysfunction, as assessed by the flowmediateddilatation protocol, than pulse transit time.Key Words: Hyperemia, Brachial Artery, Dilatation, Plethysmography, Electrocardiography, Pulse Wave,Endothelium, Running
The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the
... Show MoreBackground: The integration of modern computer-aided design and manufacturing technologies in diagnosis, treatment planning, and appliance construction is changing the way in which orthodontic treatment is provided to patients. The aim of this study is to assess the validity of digital and rapid prototyped orthodontic study models as compared to their original stone models. Materials and methods: The sample of the study consisted of 30 study models with well-aligned, Angle Class I malocclusion. The models were digitized with desktop scanner to create digital models. Digital files were then converted to plastic physical casts using prototyping machine, which utilizes the fused deposition modeling technology. Polylactic acid polymer was chose
... Show MoreBackground: Vasospasm occurs commonly in the intracranial arteries as a complication of subarachnoid haemorrhage. On the other hand, extracranial Internal carotid artery (ICA) vasospasm is scarce, and it may occur due to mechanical manipulation during cerebral angiography. We report a case of cervical carotid artery vasospasm during diagnostic cerebral angiography, which caused anterior cerebral artery territory hypoperfusion, to discuss potential risk factors. Case description: For a 22-year-old female with a ten-year history of epilepsy on multiple drugs, brain magnetic resonance imaging (MRI) showed frontal periventricular developmental venous anomaly. Diagnostic catheter cerebral angiography was used to better identify the vas
... Show MoreThe study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
The Beggar (1965) is a story of isolation and depression which is written by the Egyptian novelist Naguib Mahfouz who is considered the father of Arabic Literature in the modern era. Specifically, he refers in his great novel called The Beggar that the man unable to achieve psychological revival after Nasser’s revolution, the man sacrificed his own job and his family for a desire that increases his feelings of alienation and depression which leads him to an emotional outcry against the indifferent. The main aim of the study highlights the concept of existential dilemma as a philosophical problem and personality crisis by the protagonist of The Beggar novel, Omer Al-Hamzawi who had acc
... Show MoreA simple and novel membraneless paper-based microfluidic fuel cell was presented in this study. The occurrence of laminar flow was employed to ensure no mixing of the fuel and oxidant fluids along the bath of reaction. The acidic wastewater was used as a fuel. It was an air-breathing cell, so air and tab water were used as oxidants. Both the fuel and tab water flowed continuously under gravity. Whatman filter paper was used for preparation of the fuel cell channel and two carbon fibre electrodes were used and firmed on the edges of the cell. The performance of the cell was examined over three consecutive days. The results indicated that the present cell has the potential to generate electric power, but an extensive study is required to harv
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show More