Preferred Language
Articles
/
txeLPpMBVTCNdQwCsM95
Prevalence of coronary artery disease in patients with left bundle branch block and its association with risk factors hypertension and diabetes mellitus
...Show More Authors
Abstract<sec> <title>Background:

Left bundle branch block (LBBB) is a common finding in electrocardiography, there are many causes of LBBB.

Objectives:

The aim of this study is to discuss the true prevalence of coronary artery disease (CAD) in patients with LBBB and associated risk factors in the form of hypertension and diabetes mellitus.

Materials and Methods:

Patients with LBBB were admitted to the Iraqi heart center for cardiac disease in December 2017 to the end of April 2021; all patients underwent coronary angiography and they are classified into three groups: group 1: patients with proximal left anterior descending artery (LAD) or mid-LAD and either left circumflex artery (LCX) or right coronary artery (RCA) with lesion consider significant if more than 70% stenosis of the artery, group 2: patients with either isolated LCX or RCA with lesion if more than 70% stenosis of the artery, group 3: patients with normal coronary artery.

Results:

The most important finding in this study is that the percentage of LAD artery lesions or two vessels disease was only 24.5%. Patients in group 1 showed a high prevalence of hypertension (77.6%), whereas in group 3, the prevalence of hypertension was 47.95%. In this study, the prevalence of diabetes mellitus in group 1 was high (62.2%), whereas in group 3, it was 32%.

Conclusion:

High prevalence of men with LBBB than women, and the prevalence of LBBB increases with age. Patients who had hypertension and diabetes mellitus with LBBB most likely had an ischemic cause of LBBB, but patients with LBBB had low ejection fraction (EF) 369 out of 400 patients (90%) had low EF.

Scopus Crossref
View Publication
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Applied Linguistics And English Literature
Human Rights at Stake: Shirley Jackson’s Social and Political Protest in “The Lottery”
...Show More Authors

Nowhere is American author Shirley Jackson’s (1916-1965) social and political criticism is so intense than it is in her seminal fictional masterpiece “The Lottery”. Jackson severely denounces injustice through her emphasis on a bizarre social custom in a small American town, in which the winner of the lottery, untraditionally, receives a fatal prize. The readers are left puzzled at the end of the story as Tessie Hutchinson, the unfortunate female winner, is stoned to death by the members of her community, and even by her family. This study aims at investigating the author’s social and political implications that lie behind the story, taking into account the historical era in which the story was published (the aftermath of th

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Fabrication and Characterization CdO: In/Si Photovoltaic Solar Cell Prepard By Thermal Evaporation
...Show More Authors

Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Information Sources and their Role in E-learning from Iraqi College Students’ Viewpoint
...Show More Authors

The study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
Camille Ben Ziad and his Place in the Arab-Islamic Heritage (Historical Study)
...Show More Authors

In a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jul 07 2025
Journal Name
Annals Of Parasitology
Artemisinin efficacy against old world Leishmania donovani: in vitro and ex vivo study
...Show More Authors

Visceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …

View Publication
Scopus (9)
Scopus
Publication Date
Thu Dec 31 2020
Journal Name
College Of Islamic Sciences
The most important and important rule in the Quranic perspective "An applied study"
...Show More Authors

Abstract

    All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t

... Show More
View Publication Preview PDF