Objective: To assess the effect of six-minute walk test on health-related quality of life in patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases. Material: This descriptive study was conducted from 8th August, 2022 to 10th January, 2023. A non-probability purposive sample of 50 patients undergoing coronary artery bypass graft surgery at Iraqi center for heart diseases was included in the study. A questionnaire composed of three parts; sociodemographic and clinical data, six-minute walk test (6MWT) and health-related quality of life (HRQoL) were used. SPSS version 26 was utilized to analyze data. Results: Patient’s performance showed highly significant statistical differences at p<0.05 between pre and posttest for all items except for mean arterial pressure. Majority of patients had highly significant HRQoL after 6MWT. Conclusion: The 6MWT is important for improving HRQoL, due to its effect in enhancing patient’s physical activity and rehabilitation process following coronary artery bypass graft surgery.
This study presented an endeavour to integrate the value chain activities with the Balanced Scorecard for a comprehensive evaluation of an organization’s strategic performance. It also demonstrated the connection and the integration of the activities of the value chain with the Balanced Scorecard. The financial measurement was linked with non-financial measurement by integrating these techniques to achieve an appropriate performance that supports all aspects of the organizational performance. Consequently, the research problem in this study emerged, which is due to the concentration of many organizations on the measurement of financial performance. Notably, the latter caused the decline of some organizations from the competitive market. T
... Show MoreNon-steroidal anti-inflammatory drugs (NSAIDs) contain free –COOH which thought to be responsible for the GI irritation associated with all traditional NSAIDs. The esterification of this group is one of an approach to ultimate aim for reduce the gastric irritation; so in this study we synthesized and preliminarily evaluated new ester compounds as new analogues with expected selectivity toward COX-2 enzyme. Synthetic procedures have been successfully developed for the generation of the target compounds (III a and b). The synthetic approach involved multi-steps procedures which include: Synthesis of 4-hydroxy benzene sulphonamide ( I b ), synthesis of Naproxen and Ibuprofen acyl chloride and then reacting them with 4-hydroxy benzene sulphon
... Show MoreThe cost-effective removal of heavy metal ions represents a significant challenge in environmental science. In this study, we developed a straightforward and efficient reusable adsorbent by amalgamating chitosan and vermiculite (forming the CSVT composite), and comprehensively investigated its selective adsorption mechanism. Different techniques, such as Fourier-transform infrared spectroscopy (FTIR), zeta potential analysis, scanning electron microscopy (SEM), X-ray diffraction (XRD), and Brunauer, Emmett, Teller (BET) analysis were employed for this purpose. The prepared CSVT composite exhibited a larger surface area and higher mesoporosity increasing from 1.9 to 17.24 m2/g compared to pristine chitosan. The adsorption capabilities of the
... Show MoreIn current article an easy and selective method is proposed for spectrophotometric estimation of metoclopramide (MCP) in pharmaceutical preparations using cloud point extraction (CPE) procedure. The method involved reaction between MCP with 1-Naphthol in alkali conditions using Triton X-114 to form a stable dark purple dye. The Beer’s law limit in the range 0.34-9 μg mL-1 of MCP with r =0.9959 (n=3) after optimization. The relative standard deviation (RSD) and percentage recoveries were 0.89 %, and (96.99–104.11%) respectively. As well, using surfactant cloud point extraction as a method to extract MCP was reinforced the extinction coefficient(ε) to 1.7333×105L/mol.cm in surfactant-rich phase. The small volume of organi
... Show MoreA novel demountable shear connector for precast steel-concrete composite bridges is presented. The connector uses high-strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents bolts from slipping within their holes. Moreover, the connector promotes accelerated construction and overcomes the typical construction tolerance issues of precast structures. Most importantly, the connector allows bridge disassembly. Therefore, it can address different bridge deterioration scenarios with minimum disturbance to traffic flow including the following: (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (
... Show MoreThe temperature control process of electric heating furnace (EHF) systems is a quite difficult and changeable task owing to non-linearity, time delay, time-varying parameters, and the harsh environment of the furnace. In this paper, a robust temperature control scheme for an EHF system is developed using an adaptive active disturbance rejection control (AADRC) technique with a continuous sliding-mode based component. First, a comprehensive dynamic model is established by using convection laws, in which the EHF systems can be characterized as an uncertain second order system. Second, an adaptive extended state observer (AESO) is utilized to estimate the states of the EHF system and total disturbances, in which the observer gains are updated
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show More