Background: Acute myocardial infarction
(AMI) is one of the most common diagnoses
in hospitalized patients. The stimulus that
initiates the acute inflammatory process in AMI
has not been identified. Conventional risk
factors account only for approximately half of
the patients with clinically apparent
atherosclerosis which can leads to AMI.
Recently a potential link between infectious
agents and atherosclerosis has been suggested
Objective: To find a possible association
between Helicobacter pylori (H. Pylori)
infection and AMI.
Method: We studied the prevalence of antiH. pylori antibodies in 94 patients who were
admitted with the diagnosis of AMI and a
similar number of healthy individuals who were
age and sex matched. This was done using
ELISA technique.
Results: Overall prevalence of anti-H. pyroli
antibodies in patients with AMI was 82.9%
whereas the prevalence in the control group
was 78.7% . This difference yielded an odd ratio
of 1.317. Chi square test shows that this
difference was insignificant statistically (p-value
0.458)
Conclusion: We feel that our results do not
support the hypothesis which stated that chronic
infection with H. pylori is a major risk factor for
AMI.
Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO2 nanofilms. The results show different opacity behaviors at different w
Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreThe study's objective is to produce Nano Graphene Oxide (GO) before using it for batch adsorption to remove heavy metals (Cadmium Cd+2, Nickel Ni+2, and Vanadium V+5) ions from industrial wastewater. The temperature effect (20-50) °C and initial concentration effect (100-800) mg L-1 on the adsorption process were studied. A simulation aqueous solution of the ions was used to identify the adsorption isotherms, and after the experimental data was collected, the sorption process was studied kinetically and thermodynamically. The Langmuir, Freundlich, and Temkin isotherm models were used to fit the data. The results showed that Cd, Ni, and V ions on the GO adsorbing surface matched the Langmuir model with correlation coefficients (R2)
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show More