Background: Atrial fibrillation (AF) is a common arrhythmia in daily practice and one of the heart disorders with the highest morbidity and death rates, as it is responsible for a huge number of negative consequences. In our country, there is limited information on the prevalence or natural history of the less well-defined clinical types. Objective: to evaluate the clinical profile and coronary artery findings in atrial fibrillation patients. Patients and Methods: This cross-sectional study was conducted during the period from the first of October 2019 to end of July 2021 at the Iraqi Center for the heart disease at Baghdad Medical City. Included 32 Iraqi patients with atrial fibrillation of both genders. Angiography performed through the femoral Artery approach, Data collected by history, through clinical examination and investigations, using data collection sheet Results: The main type of AF was chronic, (62.5%), Echocardiography findings revealed Systolic dysfunction in 31.1% of patients, Diastolic dysfunction in 37.5%, and both dysfunctions in 6.2%, Left atrium was dilated in 13 (40.6%). Angiographic findings revealed RCA lesion in 13 (40.6%) patients, LCA in 9 (28.1%) while both RCA and LCA lesions present in 3 (9.4%) patients. LAD lesions reported in 10 (31.2%) patients, LCX in 27.8% and LMS in 16.8%. Conclusion: Chronic AF was the more frequent type, Systolic and diastolic dysfunction are frequent among AF patients. RCA was more frequently affected than LCA, LAD was the more affected branch.
The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.
Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreThe aim of this paper, study the effect of carbon nanotubes on the electrical properties of polyvinylchloride. Samples of polyvinylchloride carbon nanotubes composite prepared by using hot press technique. The weight percentages of carbon nanotubes are 0,5,10 and 20wt.%. Results showed that the D.C electrical conductivity increases with increasing of the weight percentages of carbon nanotubes. Also, the D.C electrical conductivity changed with increase temperature for different concentrations of carbon nanotubes. The activation energy of D.C electrical conductivity is decreased with increasing of carbon nanotubes concentration.
Due to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreReceipt date: 8/8/2020 acceptance date: 9/11/2020 Publication date: 31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The American-Iranian relations have been characterized by tensions since the arrival of the guardian jurist regime in Iran to leadership in 1979, as it was considered a turning point not only in the cont
... Show More