Preferred Language
Articles
/
jkmc-460
Unstable Angina /Non ST Elevation Myocardial Infarction: Frequency of Conventional Risk Factors; TIMI Risk Score, and Their Impact On Angiographic Data
...Show More Authors

Background: Appreciation of the crucial role of risk factors in the development of coronary artery disease (CAD) is one of the most significant advances in the understanding of this important disease. Extensive epidemiological research has established cigarette smoking, diabetes, hyperlipidemia, and hypertension as independent risk factors for CADObjective: To determine the prevalence of the 4 conventional risk factors(cigarette smoking, diabetes, hyperlipidemia, and hypertension) among patients with CAD and to determine the correlation of Thrombolysis in Myocardial Infarction (TIMI) risk score with the extent of coronary artery disease (CAD) in patients with unstable angina /non ST elevation myocardial infarction (UA/NSTEMI).Methods: We conducted a descriptive study among 100 patients admitted with UA/NSTEMI to three major cardiac centers in Iraq: Iraqi Centre for Heart Disease ,Ibn- Al-Bitar Hospital for cardiac surgery and Al -Nasyria Cardiac Centre from January 2010 to January 2o11.Frequency of each conventional risk factors and number of conventional risk factors present among patients with CAD, compared between men and women and by age are estimated at study entry. The TIMI risk score was stratified on seven standard variables. The extent of CAD was evaluated on angiography and significant CAD was defined as ≥ 70% stenosis in any one of the three major epicardial vessels and ≥50% in LMS.Results : Among 100 patients with UA/NSTEMI , 82% of patients have one or more risk factors and only 18%of patients lacked any of 4 conventional risk factors.Smoking is the most common risk factor in male patients while diabetes mellitus and dyslipidemia are common among female patients, and all these results are statistically significant.There were 64 % patients with TIMI score < 4 (low and intermediate TIMI risk score) and 36% patients with TIMI score >4 (high TIMI risk score). Patients with TIMI score > 4 were more likely to have significant three vessel CAD and LMS versus those with TIMI risk score < 4 who have less severe disease (single and two vessel disease).Conclusion: Antecedent major CAD risk factor exposures were very common among those who developed CAD emphasizing the importance of considering all major riskfactors in determining CAD risk estimation . Patients with a high TIMI risk score were more likely to have severe multivessel CAD compared with those with low or intermediate TIMI risk score. Hence, patients with TIMI score >4 should be referred for early invasive coronary evaluation to derive clinical benefit.Key words: unstable angina , Thrombolysis in Myocardial Infarction score, risk factors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 24 2018
Journal Name
International Journal Of Engineering Technologies And Management Research
MODELING CITY PULSATION VIA MOBILE DATA
...Show More Authors

In this study, the mobile phone traces concern an ephemeral event which represents important densities of people. This research aims to study city pulse and human mobility evolution that would be arise during specific event (Armada festival), by modelling and simulating human mobility of the observed region, depending on CDRs (Call Detail Records) data. The most pivot questions of this research are: Why human mobility studied? What are the human life patterns in the observed region inside Rouen city during Armada festival? How life patterns and individuals' mobility could be extracted for this region from mobile DB (CDRs)? The radius of gyration parameter has been applied to elaborate human life patterns with regards to (work, off) days for

... Show More
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science &amp; Information Technology ( Cs &amp; It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Multilayer Perceptron for analyzing satellite data
...Show More Authors

Different ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach

View Publication Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (19)
Crossref (14)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Estimating the reliability function of Kumaraswamy distribution data
...Show More Authors

The aim of this study is to estimate the parameters and reliability function for kumaraswamy distribution of this two positive parameter  (a,b > 0), which is a continuous probability that has many characterstics with the beta distribution with extra advantages.

The shape of the function for this distribution and the most important characterstics are explained and estimated the two parameter (a,b) and the reliability function for this distribution by using the maximum likelihood method (MLE) and Bayes methods. simulation experiments are conducts to explain the behaviour of the estimation methods for different sizes depending on the mean squared error criterion the results show that the Bayes is bet

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Factors that Contribute of Lung Cancer
...Show More Authors

Abstract A descriptive study to assess of factors that contributes of lung cancer. The study was carried out in Specialized Surgery teaching hospital, Ibin Al- Beetar hospital and Ibin Al- Nafees hospital for the period From January 2004 to October 2004 .The study aimed to assess the factors that contribute to lung cancer and to identify the relationship between the variables of the study with lung cancer. A purposive (non-probability) sample of (70) patients with lung cancer was selected for the study. An assessment form was employed for the purpose of the study. Test- retest reliability was employed through

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Science, Technology And Engineering Systems Journal
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 28 2025
Journal Name
The Iraqi Geological Journal
Structural Interpretation of Najaf Basin Using the Magnetic and Gravity Data, Central Iraq
...Show More Authors

Potential data interpretation is significant for subsurface structure characterization. The current study is an attempt to explore the magnetic low lying between Najaf and Diwaniyah Cities, In central Iraq. It aims to understand the subsurface structures that may result from this anomaly and submit a better subsurface structural image of the region. The study area is situated in the transition zone, known as the Abu Jir Fault Zone. This tectonic boundary is an inherited basement weak zone extending towards the NW-SE direction. Gravity and magnetic data processing and enhancement techniques; Total Horizontal Gradient, Tilt Angle, Fast Sigmoid Edge Detection, Improved Logistic, and Theta Map filters highlight source boundaries and the

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (7)
Crossref