Background: Speckle tracking echocardiography (STE)-derived mitral annular displacement (MAD) utilizes the speckle tracking technique to measure strain vectors, which provides accurate estimates of left ventricular ejection fraction (LVEF).Objectives: To validate the accuracy of mitral annular displacement (MAD), assessed by Speckle Tracking Echocardiography (STE), as a surrogate for determination of left ventricular systolic function in comparison to 2-Dimensions Simpson method in patients with different heart diseases.Methods : This cross-sectional study included patients who referred to outpatient department of Ibn Albitar Center for Cardiac Surgery, Baghdad, Iraq, between October 2012 and April 2013. STE continuously tracked annular motion throughout the cardiac cycle in the apical 4- and 2-chamber views. LVEF for each patient was measured by both Simpson method and STE-derived MAD.Results: This study included 100 patients, of them (35%) had ischemic heart disease (IHD), (10%) had dilated cardiomyopathy (DCM), (10%) had valvular heart disease (VHD), (25%) had normal echocardiography, and (20%) had hypertensive heart disease (HHD).There was significant correlation between EF % (derived by MAD) and EF % (derived by Simpson method) in patients with different heart diseases. This correlation was good in normal subjects (r=0.673), and those with IHD(r=0.896), DCM (r=0.724) and VHD (r=0.935), while in HHD it was moderately correlated (r=0.455). There was slight under-estimation of LVEF derived by MAD (a mean value of difference 0.846 %; p =0.022). In subgroup analysis, this difference was seen only in patients with HHD (a mean value of difference 3.145 %; p <0.001), while it was absent in other subgroups.Conclusion: STE-derived MAD provides easy, fast, and accurate assessments of global longitudinal systolic function. LVEF derived by MAD was correlated well with LVEF derived by Simpson method in patients with different heart diseases
The rubber ropes exercises affected muscle groups, which in turn affects the corners of the conditions of the body before and over the barrier where affected the time passed. To change the angle of the approaching and payment impact on passing each times the barrier 1-5. That passed over the barrier 1and gate 5 impacts on the nature of the achievement, where time has become less. Find the values of cruise missiles and other phases and stages of pitch angle other categories which it enshrines stood as compelling rejection men's 110m hurdles. Find the value of the instant messaging distances between different barriers and stages. Studies by adding rubber sling barriers race categories, measurement of kinematic variables. Emphasis on the devel
... Show MoreThe research abstract included introduction and the importance of the research, also included display of the problem represented by weakness for the players when performing some of the basic skills in badminton and the shuttle not reaching to the back corners of the court which gives the player the opportunity to win through applying the pressure on the opponent and make him away from the control center(T) which definitely required level of a collection muscular strength contributed in performance perhaps this related to a number of reasons related with weakness in physical changes especially explosive and characterized by speed forces for the badminton players and be acquainted with them and knowing the extent of their effect in performanc
... Show MoreThis study aimed to determine obesity level of some population in Baghdad by using Bio-electrical impedance analysis (BIA) and compared with anthropometric measurements such as body mass index (BMI), waist circumference (WC) and waist-to-hip ratio (WHR). Statistical analysis results of linear correlation coefficients for obesity indicators showed that BIA correlation 0.92 was most significant and reliable for obesity measurement.
Results of BIA method for age group 20-29 years showed that 44.4% of females were healthy body while 37.8% of males suffer from increased body fat. Results of age group 30-39 year showed that 32.6 of females were in healthy body and 42% of males were obese. In case age group 40-4
... Show MoreThe aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.