Background and Aim. Coronary artery disease (CAD) is a major risk factor for the progression to heart failure (HF), which is associated with an increase in left ventricular volume (LVV). This study aims to measure ventricular function and myocardial perfusion imaging markers of the left side of the heart, which can be performed with injection of a 99mTc at stress and rest by using single-photonemission-computed-tomography (SPECT). Subject and methods. The study included 121 patients with CAD, comprising 53 females and 68 males with ages between 25 to 88 years and 265 healthy subjects comprising 84 males and 181 females. All patients and healthy subjects volunteered to participate in this study. They were classified according to
... Show MoreThis study aimed to develop an oral drug delivery system for gastro-retentive sustained drug release of baclofen by using a 3D printed capsular device since baclofen has a short half-life of 2.5 to 4 hours and has a narrow absorption window. Firstly sustained-release tablets of baclofen were formulated through the hot-melt extrusion of various thermoplastic polymers and direct compression of the extrudate, then a capsular device was designed and 3D printed to contain two air pockets to enable floating of the device and has four windows for drug release.
3D printing of the capsular device was done by an FDM printer using biodegradable PLA filament, and the sustained release tablets were inserted into the device to allow the medici
... Show MoreEthnographic research is perhaps the most common applicable type of qualitative research method in psychology and medicine. In ethnography studies, the researcher immerses himself in the environment of participants to understand the cultures, challenges, motivations, and topics that arise between them by investigating the environment directly. This type of research method can last for a few days to a few years because it involves in-depth monitoring and data collection based on these foundations. For this reason, the findings of the current study stimuli the researchers in psychology and medicine to conduct studies by applying ethnographic research method to investigate the common cultural patterns language, thinking, beliefs, and behavior
... Show MoreBackground: Maxillary canines are important aesthetically and functionally, but impacted canines are more difficult and time consuming to treat, the aim of this study is to investigate with multi-detector computed tomography the correlation between the bone density and the upper canine impaction. Material and method: A sample of Unilaterally impacted maxillary canines from 24 patients (19 female, 5 male) who were referred to accurately localize the impacted canines at al- Karkh general hospital were evaluated by a volumetric 3-d images by the multi-detector computed tomography to accurately measure the bone density of the maxillary cortical palate of the maxillary impacted canine side and compare it with the other side of the normally erupt
... Show MoreObjective: This study aimed to assessing new suggested technique of Physical Growth Curves (PGC) charts in
children under two years old of a non-probability sample.
Methodology: A non-probability sample of size (420) children under two years selected from 12 Primary
Health Care Centers in Diyala governorate during the period from 15th Nov. 2010 to 13th Mar. 2011
according to admix of a different properties together in one chart/or growth curve chart included in at least
weight, Height, and Head circumference.
Results: the results showed different properties that can be admix together in one chart/or growth curve
chart included in at least weight, Height, and Head circumference. And to overtake the problem of the norm
Background: Absolute neutropenia in hematological malignancies remains the single most important risk factor for infection, which can be fatal and requires urgent management including radiological procedures and treatment.
Objectives: To compare computerized tomography (CT) of the chest with chest radiology (CXR) in the assessment of febrile neutropenic patients with hematologic malignancy.
Patients and methods: A prospective study, carried out in the hematological ward, Baghdad teaching hospital, for the period from 1stApril 2011to 30thApril 2012.It included 46 neutropenic febrile patients .All had chest X-ray (CXR) and computerized tomography (CT) of the chest.
Results: Male were 21, and female were 25
The study includes building a 3-D geological model, which involves get the Petrophysical properties as (porosity, permeability and water saturation). Effective Porosity, water saturation results from log interpretation process and permeability from special correlation using core data and log data. Clay volume can be calculated by six ways using IP software v3.5 the best way was by using gamma Ray. Also, Water Resistivity, flushed zone saturation and bulk volume analysis determined through geological study. Lithology determined in several ways using M-N matrix Identification, Density-Neutron and Sonic-Neutron cross plots. The cut off values are determined by Using EHC (Equivalent Hydra
The purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE
... Show MoreThe principal goal guiding any designed encryption algorithm must be security against unauthorized attackers. Within the last decade, there has been a vast increase in the communication of digital computer data in both the private and public sectors. Much of this information has a significant value; therefore it does require the protection by design strength algorithm to cipher it. This algorithm defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Performance and security level is the main characteristics that differentiate one encryption algorithm from another. In this paper suggested a new technique to enhance the performance of the Data E
... Show More