Background : It has been suggested that pretreatment with a statin agent prior to
myocardial infarction limits myocardial
creatine kinase release, and thus may act to
limit myocardial infarct size in humans.
Objective : To examine the effect of very
early statin initiation for acute myocardial
infarction (AMI), to the extent of
myonecrosis as manifested by peak serum
creatine kinase levels.
Methods : Patients with AMI admitted to AlKindy teaching hospital cardiac care unit
from 1st February 2007 to 28th February
2008, who fulfilled the inclusion criteria
cited in the present study, were randomly
assigned into two study groups. The statin
group patients have received a single oral
dose of 40 mg atorvastatin at time of
admission and repeated for the next days
until discharge, patients not receiving statin
were considered as controls, blood samples
were obtained on admission and every 8 h for
another three consecutive samples to identify
peak creatine kinase levels.
Results : Patients who had statin therapy
initiated immediately after hospital
admission have similar peak creatine kinase
concentrations as compared to those not
receiving statin therapy ( P= 0.332).
Conclusion : statin initiation in AMI patients
fails to show any observable effect on
creatine kinase release, the need of an
extended period for the statin agent to
achieve the predictable outcome may suggest
the necessity of statin pretreatment in
patients at high risk for AMI
The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe present study aims at identifying the effect of organizational pressure with its aspects (management, work team, nature and conditions of work, external environment) on job performance in all its dimensions (commitment and effort made, capabilities and the rapidity of performance, motivation and job satisfaction, work environment) for the university teacher at the Faculty of Economics, Commercial and Management Sciences at the University of Djelfa, Algeria.
In this research, the descriptive analytical approach is used. Data was collected through the distribution of a questionnaire to a sample that included 130 permanent teachers before being analyzed using the (SPSS) statisti
... Show MoreBackground: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in
... Show MoreBackground: The bond strength of the root canal sealers to dentin is very important property for maintaining the integrity and the seal of root canal filling. The aim of this study was to evaluate and compare the push-out bond strength of root filled with total fill Bioceramic, AH Plus and Gutta-flow®2 sealers using GuttaFusion®obturation system versus single cone obturation technique. Materials and method: sixty of mandibular premolars teeth with straight roots were used in this study, these roots were instrumented using Reciproc system, instrumentation were done with copious irrigation of 3 mL 5.25% sodium hypochlorite solution (NaOCl) during all the steps of preparation, and smear layer will be removed with 1 ml of 17% EDTA kept in
... Show MoreThis research was conducted under Lath house canopy of a nursery circumstances, Baghdad University for season 2013 in order to study the effect of soak lemon seeds sour orange with different levels of licorice concentrations extract (0, 0.5, 2.5 and 4.5 g/l) for 24 hours in the percentage of germination and some recipes vegetative growth of seedlings .the results outweigh the bitter orange seedlings and focus soak for licorice extract 4.5 g / l significant superiority in most of the traits plant height, leaf number, root length, stem diameter, amounting to 31.077 cm, 14.46 paper / plant, 25.35 cm, 0.52 mm respectively, which showed significant differences for the treatment of comparison which gave lower values. Clear that the licorice ext
... Show More