atrogenic atrial septal defect (IASD), post Catheter ablation during electrophysiological study simply can be assess with Echocardiography nowadays ablation consider the main line in the managements of patients with various type of arrhythmia. This study aims to de-termine the outcomes of Iatrogenic Atrial Septal Defect (IASD) six months post radiofrequency ablation (RF) procedure of left atrial arrhythmia using non-invasive Transtho-racic Echocardiography (TTE) parameters (LVEF, E/e` and ASD size) with sheath size as predictors of atrial septal defect closure. Patients and methods: A prospective study was con-ducted in Iraqi Centre for Heart Diseases included 47 patients post Electrophysiology procedure and ablation of left atrial SVT were
... Show MoreThe voice had a special place in the writting of the Andalusian poet (Ibn al-Abar ) , which aroused my attention because of the sonic capacity of the lettering inside the poetic at Ibn al-Abar poems . So Istudied the qualities of the lettering , structures and their exits . Scientists have not been able to determine the musical from the nonmusical sound , but we find the innate ability of Ibn al-Abar , which was able to determine this by using the lettering the right places and to revival the life to reflect the moments of his life , therefore came votes to express his purposes of praise and pride Etc. The poet Ibn al-Abar could exploit the lettering features in the effect of bilateral – static and moving and its ability to e
... Show MoreIntroduction: The stringent response is a bacterial adaptation mechanism triggered by stress conditions, including nutrient limitation. This response helps bacteria survive under harsh conditions, such as those encountered during infection. A key feature of the stringent response is the synthesis of the alarmone (p)ppGpp, which influences various bacterial phenotypes. In several bacterial species, stringent response activation significantly affects biofilm formation and maintenance. Methods: Clinical specimens were collected from multiple hospitals in Baghdad, Iraq. Staphylococcus aureus was identified using conventional biochemical tests. The PCR technique was applied to detect mecA, icaA, and icaD genes, while the Vitek 2 compac
... Show MoreBackground: Varicose vein (VV) is a common problem that mostly occurs in legs. This medical condition can influence the quality of life and working condition of nurses. Aim of the study: To estimate the prevalence of lower limbs varicosity and its associated risk factors among nurses. Methods: This a cross-sectional descriptive study was carried out among 100 nurses working Baghdad Teaching Hospital, Surgical Specialties Hospital, and Al- Kidney Teaching Hospital, Baghdad, Iraq from January 1st to May 10th, 2022. The participants were recruited in the study using systematic random sampling. The Occupational Sitting and Physical Activity and Aberdeen Varicose Vein Questionnaires were used for data gathering. Results: The prevalence o
... Show MoreThe research (Virtual Reality Technology and its Uses in Industrial Product Design) is interested in the virtual reality technology used in the industrial product design and consequently knowing the functions achieved in the industrial product according to the data of that technology which participates in activating the mental and imaginary image of the user which show the parameters of the technical transformation of that product. The terms used in the research have been defined to guide the reader. The second chapter, the theoretical framework consisted of three sections the first is concerned with technology in the industrial design. The second is concerned with the virtual environment and the virtual reality. The thirds chapter consi
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
Visualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show MoreThis research develops a new method based on spectral indices and random forest classifier to detect paddy rice areas and then assess their distributions regarding to urban areas. The classification will be conducted on Landsat OLI images and Landsat OLI/Sentinel 1 SAR data. Consequently, developing a new spectral index by analyzing the relative importance of Landsat bands will be calculated by the random forest. The new spectral index has improved depending on the most three important bands, then two additional indices including the normalized difference vegetation index (NDVI), and standardized difference built-up index (NDBI) have been used to extract paddy rice fields from the data. Several experiments being
... Show More