Background: For many decades, the ECG was the
workhorse of non-invasive cardiac test and today although
other techniques provide more details about the structural
anomalies in congenital heart diseases, ECG is likely to be
part of clinical evaluation of patients with such diseases
because it is inexpensive, easy to perform and in certain
situations may be both sensitive and specific.
Objective: this study carried out to identify the pattern of
ECG study in patients with TOF.
Methods: this is a retrospective study of 200 patients
with TOF, referred to Ibn Al-Bitar cardiac center from
April 1993 to May 1999. The diagnosis of TOF established
by echocrdiographic, catheterization and angiographic
study. For each patient, the ECG tracing had been analyzed
for rhythm, p-wave, P-R interval, QRS axis, duration and
T-wave in V1 and any chamber enlargement.
Results: The ECG analysis revealed that all patients had
sinus rhythm, normal P-R interval and normal p-wave
duration and amplitude, and normal QRS duration. All
studied patients had one criteria of RVH and 95% of them
had two or more of such criteria.
Conclusion: we found that in the absence of RVH
criteria, the diagnosis of TOF is unlikely and the present of
northwest axis should indicate canal type VSD
The Love Creek Nature Center, one of the three nature centers located within the boundaries of Berrien County, is owned and operated by the county for public enjoyment and instruction of nature. The 44.5 ha study area, located seven km east of Berrien Springs, and two km southwest of Berrien Center, on Huckleberry Road, in T6S, R17W, sections 16, 17 (Lat. 41° 56' N; Long. 86° 18' W) is made up of deciduous woods and abandoned fields at various stages of succession. It is bounded on the east by the Berrien County Dog Pound and Huckleberry Road, to the north by cultivated Berrien County land and the Berrien General Hospital, to the west by the recently closed Berrien - Oronoko Township Landfill Dump; and to the south b
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThe Comedy of patterns dramas that gave Representative possibilities of advanced functionality and wide being dependent on the diversity performance piece , which is intended to provoke laughter at the receiver, through the diversity of genres performing between dancing and singing and Albantomaim and other methods that have made them distinct from the species dramas other being enabled Representative in dealing with all roles across mature and adaptation of his tools of physical and vocal , as the comedy discusses the societal issues many have a factor of psychological and behind their platforms as a tool face is not directly give way to vent citizen injustice and disadvantages of humans and these conditions need to techniques of physic
... Show MoreIn the present work, Response Surface Methodology (RSM) was utilized to optimize process variables and find the best circumstances for indirect electrochemical oxidation of mimicked wastewater to remove phenol contaminants using prepared ternary composite electrode. The electrodeposition process is used for the synthesis of a ternary composite electrode of Mn, Co, and Ni oxides. The selected concentrations of metal salts of these elements were 0.05, 0.1, and 1.5 M, with constant molar ratio, current density, and electrolysis time of 1:1:1, 25 mA/cm2, and 2 h. Interestedly, the gathered Mn-Co-Ni oxides were deposited at both the anode and cathode. X-ray diffraction (XRD) and scanning electron microscopy (SEM) facilitated the qualitative char
... Show MoreBackground: Normal occlusal features of primary dentition are crucial for normal development of the permanent dentition. Breastfeeding is an important factor for both general and dental health of children. Aim: The aim of the present study is to assess the impact of the breastfeeding duration on the prevalence of normal occlusal features of the primary dentition among preschool children in Baghdad. Materials and Methods: The sample was 630 Iraqi children (270- boys, 360 girls), aged 3-5 years selected from four kindergartens in Baghdad city. The study was carried out through questionnaire and clinical examination. Normal occlusal features were examined as the presence or absence of interincisive spaces (IS) and primate spaces (PS), termi
... Show MoreThis study aims to analyze the messages of a number of global news outlets on Twitter. In order to clarify the news outlets tactics of reporting, the subjects and focus during the crisis related to the spread of the Covid-19 virus. The study sample was chosen in a deliberate manner to provide descriptive results. Three news sites were selected: two of the most followed, professional and famous international news sites: New York Times and the Guardian, and one Arab news site: Al-Arabiya channel.
A total of 18,085 tweets were analyzed for the three accounts during the period from (1/3/2020) to (8/4/2020). A content analysis form was used to analyze the content of the news coverage. The results indicate an increase in th
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Abstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the
The Carbonate-clastic succession in this study is represented by the Shuaiba and Nahr Umr Formations deposited during the Albian - Aptian Sequence. The present study includes petrography, microfacies analyses, and studying reservoir characterizations for 5 boreholes within West Qurna oil field in the study area. According to the type of study succession (clastic – Carbonate) there are two types of facies analyses:-Carbonate facies analysis, which showed five major microfacies were recognized in the succession of the Shuaiba Formation, bioclastic mudstones to wackstone, Orbitolina wackestone to packstone, Miliolids wackestone, Peloidal wackestone to packstone and mudstone to wackestone identified as an open shelf toward the deep basin.
... Show More