Background: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of the study: Cross sectional study.Patients and Methods : Forty (40) consecutive patients (11 female and 29 male), at a mean age of 46 ± 9 years (range 28–60) with chronic non-rheumatic Atrial fibrillation were enrolled to this prospective study between March 2006 and December 2006. Tansthoracic and transesophageal two dimensional , M- mode , Doppler, and color- flow echocardiography were obtained with a kretz diagnostic ultrasound system. Results : The prevalence of Left atrium thrombus was 12.5%, 5 patients from the total number which was 40 patients. All of them seen bytransoesophagealechocardiography and non are detected byTansthoracic echocardiography . All the left atrial thrombi were confined to the left atrial appendage (100%). Left atrial spontaneous echo contrast was detected in 10 patients 25% by transoesophageal echocardiography, but was not observed in patient bytransthoracic echocardiography. All the 5 thrombi were found in left atria were significantly associated with spontaneous echo contrast 100% (P-value <0.001), reduced left ventricle ejection fraction (p-value <0.05) , large left atrium diameter ( p-value <0.05) and low LAAV <20 cm/s (p-value <0.001) compared to those without thrombus . Conclusions : The study showed that the prevalence of left atrial thrombus and appendage is not uncommon in patients with non-rheumatic atrial fibrillation and is exclusively seen in patients with left atrial SEC. Low Left ventricle ejection fraction , large Left atrium diameter , and low Left atrial appendages velocity are significantly associated with subsequent thrombus formation , and is more sensitive in the detection of these abnormalities compared with transthoracic echocardiography
In Iraq, there is a limited research work exploring the clinical pharmacists' role from the point of view of other healthcare professionals.
To investigate physicians' assessment of clinical pharmacy services at Baghdad hospitals, and compare junior physicians with senior physicians' point of view.
The study was conducted in twelve governmental hospitals in Baghdad, Iraq. Data was collected from a sample of two hundred physicians, and through a validated, self-administered questionnaire, which comprised twenty statements in addition to a non-personal information form that precedes the questionnaire
The study findings reveal a somewhat positive point of view towards clinical pharmacists' performance in
... Show MoreBACKGROUND: The rapidly growing knowledge regarding factors controlling tumour growth, with the new modalities of therapy acting on the biological activity of the tumours draw the attention of most cancer researches nowadays and represent a major focus for clinical oncology practice. For the detection of HER2/neu protein overexpression and gene amplification, immunohistochemistry (IHC) and in-situ hybridisation (ISH) is the recommended techniques, respectively, with high concordance between the two techniques. The current United Kingdom recommendations for HER2/neu testing are either for a two-tier system using IHC with reflex ISH testing in equivocal positive cases, or a one-tier ISH strategy. AIM: To compare the results of HER2/neu gene s
... Show MoreOnline examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical meth
... Show MoreBackground: The appointment system is a common practice in primary health care clinics in developed countries. The patients and health care providers in the primary health care setting perceived the appointment system as an indicator of good quality service.
Objective: The aim of this study was to survey patients’ and health care providers’ attitudes towards the introduction of an appointment system and their satisfaction with the existing ‘walk-in’ system in the primary health care setting.
Subjects and Methods: A questionnaire survey was conducted included a convenient sample of 234 patients as well as 76 health care providers from two primary health care center
... Show MoreBackground: Refractory/relapsed acute leukemia has always been a challenging problem for hematologist. Over the past decade emphasis has been made in the development of regimens containing fludarabine, combined with cytosine arabinoside for the treatment of refractory/relapsed acute leukemias. The aim of this study is to evaluate the efficacy and toxicity of the combination of fludarabine, high dose cytarabine, and granulocyte colony stimulating factor in refractory relapsed cases of acute leukaemia,
Methods: a prospective study is being conducted at the national center of hematology and hematology unit /Baghdad teaching hospital from July 2008 to July 2010.Twenty Patients with refractory/relapsed acute leukemia were treated with flud
Background: Central serous chorioretinopathy (CSCR) is an idiopathic condition aggravated by exogenous or endogenous glucocorticoids. Vascular deregulation in the choroid is a new hypothesis regarding central serous chorioretinopathy occurrence. The inhibition of choroidal mineralocorticoid receptors has a great role in shortening the duration of CSCR by inhibiting choroidal vasodilatation and leak.
Objective: To assess the effect of oral spironolactone on subretinal fluid, central macular thickness and visual acuity in patients with acute CSCR compared to observation.
Subjects and Methods: a hospital based, randomized clinical trial carried out at outpatient clinic in Ibn-Alhaitham Teaching E
... Show Morein this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.