Background: Speckle tracking echocardiography (STE)-derived mitral annular displacement (MAD) utilizes the speckle tracking technique to measure strain vectors, which provides accurate estimates of left ventricular ejection fraction (LVEF).Objectives: To validate the accuracy of mitral annular displacement (MAD), assessed by Speckle Tracking Echocardiography (STE), as a surrogate for determination of left ventricular systolic function in comparison to 2-Dimensions Simpson method in patients with different heart diseases.Methods : This cross-sectional study included patients who referred to outpatient department of Ibn Albitar Center for Cardiac Surgery, Baghdad, Iraq, between October 2012 and April 2013. STE continuously tracked annular motion throughout the cardiac cycle in the apical 4- and 2-chamber views. LVEF for each patient was measured by both Simpson method and STE-derived MAD.Results: This study included 100 patients, of them (35%) had ischemic heart disease (IHD), (10%) had dilated cardiomyopathy (DCM), (10%) had valvular heart disease (VHD), (25%) had normal echocardiography, and (20%) had hypertensive heart disease (HHD).There was significant correlation between EF % (derived by MAD) and EF % (derived by Simpson method) in patients with different heart diseases. This correlation was good in normal subjects (r=0.673), and those with IHD(r=0.896), DCM (r=0.724) and VHD (r=0.935), while in HHD it was moderately correlated (r=0.455). There was slight under-estimation of LVEF derived by MAD (a mean value of difference 0.846 %; p =0.022). In subgroup analysis, this difference was seen only in patients with HHD (a mean value of difference 3.145 %; p <0.001), while it was absent in other subgroups.Conclusion: STE-derived MAD provides easy, fast, and accurate assessments of global longitudinal systolic function. LVEF derived by MAD was correlated well with LVEF derived by Simpson method in patients with different heart diseases
<span lang="EN-US">Diabetes is one of the deadliest diseases in the world that can lead to stroke, blindness, organ failure, and amputation of lower limbs. Researches state that diabetes can be controlled if it is detected at an early stage. Scientists are becoming more interested in classification algorithms in diagnosing diseases. In this study, we have analyzed the performance of five classification algorithms namely naïve Bayes, support vector machine, multi layer perceptron artificial neural network, decision tree, and random forest using diabetes dataset that contains the information of 2000 female patients. Various metrics were applied in evaluating the performance of the classifiers such as precision, area under the c
... Show MoreIn this work the corrosion behavior of Ti-6Al-4V alloy was studied by using galvanostatic measurements at room temperature in different media which includ sodium chloride (food salt), sodium tartrate (presence in jellies, margarine, and sausage casings,etc.), sodium oxalate (presence in fruits, vegetables,etc.), acetic acid (presence in vinegar), phosphoric acid (presence in drink), sodium carbonate (presence in 7up drink,etc.), and sodium hydroxide in order to compare.
Corrosion parameters were interpreted in th
... Show MoreThis study is concerned with a survey of seven species belonging to seven genera under two families and two orders found in some different areas of the Tigris River, especially since these areas have not been surveyed for a long time, and an attempt to identify the existing species at the present time after the recent water scarcity of the Tigris and Euphrates rivers and all water bodies interior of Iraq and the impact of this scarcity on the fish diversity found in some areas of the Tigris River in Baghdad.
The Assignment model is a mathematical model that aims to express a real problem facing factories and companies which is characterized by the guarantee of its activity in order to make the appropriate decision to get the best allocation of machines or jobs or workers on machines in order to increase efficiency or profits to the highest possible level or reduce costs or time To the extent possible, and in this research has been using the method of labeling to solve the problem of the fuzzy assignment of real data has been approved by the tire factory Diwaniya, where the data included two factors are the factors of efficiency and cost, and was solved manually by a number of iterations until reaching the optimization solution,
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreIn this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).
With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More