Preferred Language
Articles
/
txeLPpMBVTCNdQwCsM95
Prevalence of coronary artery disease in patients with left bundle branch block and its association with risk factors hypertension and diabetes mellitus
...Show More Authors
Abstract<sec> <title>Background:

Left bundle branch block (LBBB) is a common finding in electrocardiography, there are many causes of LBBB.

Objectives:

The aim of this study is to discuss the true prevalence of coronary artery disease (CAD) in patients with LBBB and associated risk factors in the form of hypertension and diabetes mellitus.

Materials and Methods:

Patients with LBBB were admitted to the Iraqi heart center for cardiac disease in December 2017 to the end of April 2021; all patients underwent coronary angiography and they are classified into three groups: group 1: patients with proximal left anterior descending artery (LAD) or mid-LAD and either left circumflex artery (LCX) or right coronary artery (RCA) with lesion consider significant if more than 70% stenosis of the artery, group 2: patients with either isolated LCX or RCA with lesion if more than 70% stenosis of the artery, group 3: patients with normal coronary artery.

Results:

The most important finding in this study is that the percentage of LAD artery lesions or two vessels disease was only 24.5%. Patients in group 1 showed a high prevalence of hypertension (77.6%), whereas in group 3, the prevalence of hypertension was 47.95%. In this study, the prevalence of diabetes mellitus in group 1 was high (62.2%), whereas in group 3, it was 32%.

Conclusion:

High prevalence of men with LBBB than women, and the prevalence of LBBB increases with age. Patients who had hypertension and diabetes mellitus with LBBB most likely had an ischemic cause of LBBB, but patients with LBBB had low ejection fraction (EF) 369 out of 400 patients (90%) had low EF.

Scopus Crossref
View Publication
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Thu Jan 20 2022
Journal Name
Webology
Information Sources and their Role in E-learning from Iraqi College Students’ Viewpoint
...Show More Authors

The study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
REDESCRIPTION AND SOME POLYMORPHISM NOTES IN WORKERS OFCAMPONOTUS XERXESFOREL, 1904 (HYMENOPTERA: FORMICIDAE; FORMICINAE)
...Show More Authors

     The specimens of Camponotusxerxes Forel, 1904 were collected from different localities in Iraq; the purpose of morphological study of this species in details throughout the present study.

 

     The description was based on major workers belonging to this species, also some notes of polymorphism in workers have been mentioned; the most important of morphological features are illustrated and figured.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Lecture Notes In Computer Science
Constrained Differential Evolution for Cost and Energy Efficiency Optimization in 5G Wireless Networks
...Show More Authors

The majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Biofilm formation rate measurement in water and biomedical systems using photometric smartphones applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Concrete strength development by using magnetized water in normal and self-compacted concrete
...Show More Authors
Abstract<p>The main objective of this work was to adopt an environmentally friendly technology with enhanced results. The technology of magnetic water (MW) treatment system can be used in concrete mixture production instead of potable water (PW) to improve both workability and strength. Two types of concrete were adopted: normal concreter production with two grades 25 and 35 MPa and the self-compacted concrete (SCC) with 35 MPa grade. The concrete mixes containing MW instead of PW results showed that, for 25 MPa grade, an improvement in a compressive strength of 15.1, 14.8, and 10.2% was achieved for 7, 28, and 90 days, respectively. For 35 MPa grade, an improvement of 13.6, 11.5, and </p> ... Show More
Crossref (6)
Crossref
Publication Date
Mon Dec 29 2025
Journal Name
Annals Of Parasitology
Artemisinin efficacy against old world Leishmania donovani: in vitro and ex vivo study
...Show More Authors

Visceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …

View Publication
Scopus (11)
Scopus