Background: Atrial fibrillation (AF) is a common arrhythmia in daily practice and one of the heart disorders with the highest morbidity and death rates, as it is responsible for a huge number of negative consequences. In our country, there is limited information on the prevalence or natural history of the less well-defined clinical types. Objective: to evaluate the clinical profile and coronary artery findings in atrial fibrillation patients. Patients and Methods: This cross-sectional study was conducted during the period from the first of October 2019 to end of July 2021 at the Iraqi Center for the heart disease at Baghdad Medical City. Included 32 Iraqi patients with atrial fibrillation of both genders. Angiography performed through the femoral Artery approach, Data collected by history, through clinical examination and investigations, using data collection sheet Results: The main type of AF was chronic, (62.5%), Echocardiography findings revealed Systolic dysfunction in 31.1% of patients, Diastolic dysfunction in 37.5%, and both dysfunctions in 6.2%, Left atrium was dilated in 13 (40.6%). Angiographic findings revealed RCA lesion in 13 (40.6%) patients, LCA in 9 (28.1%) while both RCA and LCA lesions present in 3 (9.4%) patients. LAD lesions reported in 10 (31.2%) patients, LCX in 27.8% and LMS in 16.8%. Conclusion: Chronic AF was the more frequent type, Systolic and diastolic dysfunction are frequent among AF patients. RCA was more frequently affected than LCA, LAD was the more affected branch.
The following dilutions -710X46, -610X46, -510X46 of Bacillus thuringiensis were used for bioassay against the different larval instar of the potato tuber moth Phthorimaea operculella by the spraying method, the results showed that there was no significant influence in the percentage of egg hatching in comparison with the control. The sensitivity of larval stages was reduced with the increasing the age and exposure period. The study also showed that the larvae infected with B.t. stopped feeding, movement and a general paralysis causing the death of larva after (24-48) hours , and the larva color was changed from the natural waxy colour to brown finally to the black after death.
Abstract Objective: The aim of this study is to evaluate the level of the anatomical knowledge of undergraduate students in Nursing collage/Baghdad university.Methodology:The sample was collected by symmetrical probability. Research sample includes (197)students represent four classes which is distributed as following: fifty students represent first class, fifty students represent the second class, forty nine students represent the third class,&fourty eight students represent the fourth class. Results:The study concludes that the anatomical knowledge level for collage students is intermediate .The m
The Messengers and the Imam of the God-fearing, Muhammad is God, his family, and all of his companions. As for what comes after... Fainting is one of the involuntary symptoms and states that occur to a person when carrying out his life’s tasks suddenly due to his loss of sense and movement, so he loses consciousness for a period of time that is short or may be long, and the person is held accountable and responsible for every moment of his life. He is required to perform duties specified by Sharia law, such as prayer, fasting, and Hajj...and fainting prevents him from performing these actions. We must consider the opinions of jurists and know the legal implications resulting from it. It was said that a person has a capacity that enable
... Show MoreThe graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show MoreThe results showed the spread of disease blight leaves caused by injury fungus Alternaria in different areas of cultivation in the city of Baghdad where he was recording the highest rate and the severity of the disease of 100% and 80%, respectively, in the Abu Ghraib area and the least of 20% and 12% respectively in the Amiriya district results showed test pathogenicity of the fungus pathogen emergence of symptoms of the disease superficial discoloration Authority of black paper when wound areas and yellowing of leaves about race as centrist and leaky latest country clear ????? on Central race after 48 hours ....
Crop coefficient for cherries was evaluated by measure the water consumption in Michigan State to find its variation with time as the plant growth. Crop coefficients value (Kc) for cherries were predicated by Michigan State University (MSU) and also by Food and Agriculture Organization (FAO) according to consume of water through the season. In this paper crop coefficients for cherries are modified accordingly to the actual measurements of soil moisture content. Actual evapotranspiration (consumptive use) were measured by the soil moisture readings using Time Domain Reflectometers (TDR), and compared with the actual potential evapotranspiration that calculated by using modified Penman-Monteith equation which depends on metrological statio
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More