Preferred Language
Articles
/
jkmc-350
Detection of Thrombi in Left Atrial chamber by Transoesophageal Ecchocardiography in patients suffer from Non-rheumatic Atrial Fibrillation
...Show More Authors

Background: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of the study: Cross sectional study.Patients and Methods : Forty (40) consecutive patients (11 female and 29 male), at a mean age of 46 ± 9 years (range 28–60) with chronic non-rheumatic Atrial fibrillation were enrolled to this prospective study between March 2006 and December 2006. Tansthoracic and transesophageal two dimensional , M- mode , Doppler, and color- flow echocardiography were obtained with a kretz diagnostic ultrasound system. Results : The prevalence of Left atrium thrombus was 12.5%, 5 patients from the total number which was 40 patients. All of them seen bytransoesophagealechocardiography and non are detected byTansthoracic echocardiography . All the left atrial thrombi were confined to the left atrial appendage (100%). Left atrial spontaneous echo contrast was detected in 10 patients 25% by transoesophageal echocardiography, but was not observed in patient bytransthoracic echocardiography. All the 5 thrombi were found in left atria were significantly associated with spontaneous echo contrast 100% (P-value <0.001), reduced left ventricle ejection fraction (p-value <0.05) , large left atrium diameter ( p-value <0.05) and low LAAV <20 cm/s (p-value <0.001) compared to those without thrombus . Conclusions : The study showed that the prevalence of left atrial thrombus and appendage is not uncommon in patients with non-rheumatic atrial fibrillation and is exclusively seen in patients with left atrial SEC. Low Left ventricle ejection fraction , large Left atrium diameter , and low Left atrial appendages velocity are significantly associated with subsequent thrombus formation , and is more sensitive in the detection of these abnormalities compared with transthoracic echocardiography

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Sprite Region Allocation Using Fast Static Sprite Area Detection Algorithm
...Show More Authors

Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Minimum Spanning Tree Algorithm for Skin Cancer Image Object Detection
...Show More Authors

This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that

... Show More
View Publication Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 15 2024
Journal Name
Scientific Reports
Ag@WO3 core–shell nanocomposite for wide range photo detection
...Show More Authors

This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating Quality of Control Policies and Procedures for Banking Transactions Using the Non-application Gap Model to Enhance Financial Reporting Requirements Applied Study in an Iraqi Private Bank
...Show More Authors

The research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatementsThe researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Bionatura
Isolation and identification of intestinal parasites from Goats in some areas of Wasit Province, Iraq
...Show More Authors

The current study was conducted on goats in various parts of Wasit Province, Iraq, from November 2021 to April 2022. The study aims to find and identify intestinal parasites (IPs) in goats in Wasit province. The goat's fresh fecal specimens (n=180) include cysts, eggs, oocysts, trophozoites and larval stages. One hundred eighty sheep feces samples were collected, and more than one parasite was isolated from one sample (mixed infection). According to the data acquired, the overall prevalence of intestinal parasites in goats was 52.77 (95 samples). In the current investigation, eleven distinct (IPs) species with infection rates were identified, including Toxocara vitulorum (Goeze, 1782) (16.66 %), Cryptosporidium sp.( Tyzzer, 1907) (1

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 22 2018
Journal Name
Journal Of Biodiversity And Environmental Sciences
Survey and taxonomical study of ants that collected from indoor in different regions of Iraq
...Show More Authors