Background: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study. For each patient, the ECG tracing had been analyzed
for rhythm, p-wave, P-R interval, QRS axis, duration and
T-wave in V1 and any chamber enlargement.
Results: The ECG analysis revealed that all patients had
sinus rhythm, normal P-R interval and normal p-wave
duration and amplitude, and normal QRS duration. All
studied patients had one criteria of RVH and 95% of them
had two or more of such criteria.
Conclusion: we found that in the absence of RVH
criteria, the diagnosis of TOF is unlikely and the present of
northwest axis should indicate canal type VSD
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreBackground: Normal occlusal features of primary dentition are crucial for normal development of the permanent dentition. Breastfeeding is an important factor for both general and dental health of children. Aim: The aim of the present study is to assess the impact of the breastfeeding duration on the prevalence of normal occlusal features of the primary dentition among preschool children in Baghdad. Materials and Methods: The sample was 630 Iraqi children (270- boys, 360 girls), aged 3-5 years selected from four kindergartens in Baghdad city. The study was carried out through questionnaire and clinical examination. Normal occlusal features were examined as the presence or absence of interincisive spaces (IS) and primate spaces (PS), termi
... Show MoreThis study aims to analyze the messages of a number of global news outlets on Twitter. In order to clarify the news outlets tactics of reporting, the subjects and focus during the crisis related to the spread of the Covid-19 virus. The study sample was chosen in a deliberate manner to provide descriptive results. Three news sites were selected: two of the most followed, professional and famous international news sites: New York Times and the Guardian, and one Arab news site: Al-Arabiya channel.
A total of 18,085 tweets were analyzed for the three accounts during the period from (1/3/2020) to (8/4/2020). A content analysis form was used to analyze the content of the news coverage. The results indicate an increase in th
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Abstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the
The Carbonate-clastic succession in this study is represented by the Shuaiba and Nahr Umr Formations deposited during the Albian - Aptian Sequence. The present study includes petrography, microfacies analyses, and studying reservoir characterizations for 5 boreholes within West Qurna oil field in the study area. According to the type of study succession (clastic – Carbonate) there are two types of facies analyses:-Carbonate facies analysis, which showed five major microfacies were recognized in the succession of the Shuaiba Formation, bioclastic mudstones to wackstone, Orbitolina wackestone to packstone, Miliolids wackestone, Peloidal wackestone to packstone and mudstone to wackestone identified as an open shelf toward the deep basin.
... Show MoreIn this work, electrochemical process was presented to polymerized eugenol on Gr.2 and Gr.5 titanium alloys before and after treated by Micro Arc Oxidation (MAO), where Gr.2 is commercial pure titanium and Gr.5 is Ti-6Al-4V dental alloys. The deposited layers were characterized by scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), and Fourier transform infrared spectroscopy (FTIR). The adhesion strength of polymeric thin-film was estimation by using pull-off adhesion test and the result was the adhesion strength of PE was (1.23 MPa) on Gr.2 before MAO and increase to (1.98 MPa) on Gr.2 after MAO treatment. The corrosion behavior of Gr.2 and Gr.5 alloy in artificial saliva environment at
... Show MoreIn the present research is marked (expressive drawing in contemporary Iraq, the study of morphological features) eating expressive as the direction of modern art in the drawing for the period before and after World Wars I and II. And follow the tracks. And in research and investigation about the origins and sources and characteristics of expressionist painting at adult patrons and art gatherings, and the extent of their impact in the drawing for contemporary Iraqi sixties and seventies generation (generation of professors) and down to the younger generation in the eighties of the last century. Over the nearly two decades of history of fine movement in Iraq, a period specified in the search within the limits of temporal boundaries, and by
... Show MoreThe media of all kinds have the task of introducing, expressing and objectively representing the cultures of different societies in various types and forms of press and media. The precept of media pluralism is the basis for freedom of expression & the cornerstone of its realization. Therefore, it is linked to the establishment of several conditions and elements in order to establish it as a principle and practice. Issues of cultural diversity in media and cultural pluralism are one of the most important elements and indicators. So, this paper aims to shed light on the concept of media pluralism and related concepts within the framework of cultural diversity and multicultural indicators. Thus, highlighting the feature
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More