Objectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a piezoelectric pressure sensor and asimultaneous Lead I electrocardiogram. Endothelial dysfunction (ED) was induced by oscillatory and retrogradeshear rates. The correlation between variables was calculated in Excel running on the Windows operating system.Results: There were 10 second-year medical students with mean age 22±0 years and mean body mass index25.7±4.8kg/m2. During reactive hyperaemia, pulse transit time was significantly increased by 3-5% in both normalendothelium and experimentally induced endothelial dysfunction relative to the pre-occluded artery, and thedifference was not significant (p>0.05). Digital pulse wave amplitude increased significantly in normal endotheliumrelative to the pre-occluded artery (p<0.05), but not in experimentally-induced endothelial dysfunction (p>0.05).Conclusion: The pulse transit time and digital pulse wave amplitudes of the photo plethysmography signal may beused to detect changes in vessel wall diameter and tone throughout the reactive hyperaemia process. Digital pulsewave amplitude was better able to detect experimentally-induced endothelial dysfunction, as assessed by the flowmediateddilatation protocol, than pulse transit time.Key Words: Hyperemia, Brachial Artery, Dilatation, Plethysmography, Electrocardiography, Pulse Wave,Endothelium, Running
The study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreAbstract Metabolic syndrome (MS) is a group of clinical and biological abnormalities included risk of insulin resistance , disorders in glucose metabolism , abdominal obesity and abnormal lipid profile these features confer a greater risk of cardiovascular diseases . Anyway, the co-occurrence of diabetes mellitus and metabolic syndrome potentiates the cardiovascular risk associated with each of the two conditions. The present study aimed to determine a relationship between prolactin level in type -2- diabetic Iraqi women and metabolic syndrome, as well to find a relationship between prolactin level and other studied biochemical markers. seventy menopausal diabetic women with metabolic syndrome with age in range (45-50) years were enrolled i
... Show MoreThe presence of research Repositories in the intellectual production of universities and their availability through their websites or through their scientific institutions is one of the criteria for evaluating these universities in the international classifications of the best universities, in addition to preserving the intellectual output of these universities for a long time and safely and preserving the property rights of researchers. And made them available through their websites. The purpose of this research is to identify the concept of digital content and research repositories and its origin, and to indicate the importance of its existence through the websites of universities and their types, and to identify the research repositories
... Show MoreBackground: The integration of modern computer-aided design and manufacturing technologies in diagnosis, treatment planning, and appliance construction is changing the way in which orthodontic treatment is provided to patients. The aim of this study is to assess the validity of digital and rapid prototyped orthodontic study models as compared to their original stone models. Materials and methods: The sample of the study consisted of 30 study models with well-aligned, Angle Class I malocclusion. The models were digitized with desktop scanner to create digital models. Digital files were then converted to plastic physical casts using prototyping machine, which utilizes the fused deposition modeling technology. Polylactic acid polymer was chose
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More