Preferred Language
Articles
/
jkmc-758
Electro Cardiographic Features of Ptients With Tetralogy of Fallot
...Show More Authors

Background: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study. For each patient, the ECG tracing had been analyzed
for rhythm, p-wave, P-R interval, QRS axis, duration and
T-wave in V1 and any chamber enlargement.
Results: The ECG analysis revealed that all patients had
sinus rhythm, normal P-R interval and normal p-wave
duration and amplitude, and normal QRS duration. All
studied patients had one criteria of RVH and 95% of them
had two or more of such criteria.
Conclusion: we found that in the absence of RVH
criteria, the diagnosis of TOF is unlikely and the present of
northwest axis should indicate canal type VSD

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions
...Show More Authors

The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Higher education in Iraq : its process and features of development during the period of 1932 A.D – 1958 A.D
...Show More Authors

In order to specify the features of higher education process and its quantitative and qualitative development in Iraq ; one should look back at its historical process and the need of interesting with it .

Accordingly , there will be a chance for verifying the demand of the Iraqi society according to the political , social , and cultural changes especially  during the national governance (1932 – 1958 ) .

For depicting the most important quantitative and qualitative development of this kind of education the period of 1932 -1958 , and since there is no previous study that tackled this topic , here comes the need of writing this paper .

After historical

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MORPHOMETRIC FEATURES OF THE BEETLE ACINOPUS (ACINOPUS) LAEVIGATUS MENETRIES, 1832 (COLEOPTERA, CARABIDAE) IN THE MOUNTAIN ECOSYSTEMS OF UZBEKISTAN
...Show More Authors

The morphometric parameters of Acinopus (Acinopus) laevigatus Ménétriés, 1832 (Coleoptera, Carabidae) were studied and their altitudinal variability was assessed. The length of head is the most variable, and the smallest value of the coefficient of variation is observed for the width of elytra. The length of body parts (head, pronotum, elytra) were more variable compared to their width. The correlation relationship between the morphometric parameters of different parts of the body was analyzed. A high correlation was found between the elytra length (EL) and the total body length (BL) (r=0.93), and the lowest correlation was found between the elytra width (EW) and the pronotum length (PL) (r=0.57). According to all measurement indicato

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Ecological Engineering & Environmental Technology
Synthesis of Mn-Co-Ni Composite Electrode by Anodic and Cathodic Electrodeposition for Indirect Electro-oxidation of Phenol – Optimization of the Removal by Response Surface Methodology
...Show More Authors

In the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative char

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
Usage Features of the phraseological units in Russian political Discourse: Особенности использования фразеологизмов в российском политическом дискурсе
...Show More Authors

This article examines the usage features of the phraseological units in Russian political discourse and the peculiarities of the phraseological units’ usage by politicians in their speeches.  The main focus is on the expressive and pragmatic functions of using phraseological units in political texts due to their evaluative and expressive nature.  The present article also examines the structural and stylistic changes of the phraseological units in political discourse.  Moreover, the work provides examples from the speeches of the Minister of Foreign Affairs of the Russian Federation S.V.  Lavrov.  As a result, the author comes to the conclusion that phraseological units make it possible to establish a contact be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Features of the actor's performance in the ritual theater (Iraqi theater as a model): علي شخير نفل
...Show More Authors

The features of the actor's performance in the ritual theater are of great importance and chief in theatrical work since the first emergence of the theater, as the features of the performance were embodied in all Iraqi theatrical performances, but they took personal privacy in some ritual performances because of their differences and similarities between the ritual theatrical performance and the ritual show Al-Khalis, who wanted the researcher to know the similarities and differences in the features of the ritual performance and in the theatrical performance, despite the many transformations that occurred in the theater and affected the features of the performance, but it remained an important and attractive link between the recipient, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A VEGETATIONAL STUDY OF THE LOVE CREEK NATURE CENTER BFRR1EN COUNTY, MICHIGAN HISTORICAL, PHYSICAL AND ECOLOGICAL FEATURES
...Show More Authors

    The Love Creek Nature Center, one of the three nature centers located within the boundaries of Berrien County, is owned and operated by the county for public enjoyment and instruction of nature. The 44.5 ha study area, located seven km east of Berrien Springs, and two km southwest of Berrien Center, on Huckleberry Road, in T6S, R17W, sections 16, 17 (Lat. 41° 56' N; Long. 86° 18' W) is made up of deciduous woods and abandoned fields at various stages of succession. It is bounded on the east by the Berrien County Dog Pound and Huckleberry Road, to the north by cultivated Berrien County land and the Berrien General Hospital, to the west by the recently closed Berrien - Oronoko Township Landfill Dump; and to the south b

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
2016 8th Computer Science And Electronic Engineering (ceec)
Class-specific pre-trained sparse autoencoders for learning effective features for document classification
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More