Preferred Language
Articles
/
jkmc-853
Arrhythmia-Induced Cardiomyopathy. A Palestinian Experience
...Show More Authors

A 20 year-old male was admitted with a history of recurrent palpitations from 5 years. Baseline ECG revealed premature ventricular contractions (PVCs) with delta waves. Stress ECG showed short non-sustained Ventricular tachycardia (VT). Echocardiography showed moderate dilation of the left ventricle with mild reduced systolic function and Ejection fraction was estimated to be 42%. Right ventricle was mildly dilated and hypokinetic. Both atria were mildly dilated. The patient referred to CVC for EP study with possible ablation. The ablation of the focus led to complete suppression of the ectopy. Post-procedure ECG and echocardiography showed normalized rhythm and systolic function.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Approach to Manage Congenital Absence of Anterior Cruciate Ligament in a 13 years old Patient – A Rare Case Report of Eastern India
...Show More Authors

Congenital absence of anterior cruciate ligament is highly uncommon occurrence. It has since been documented as a standalone anatomical entity or, more frequently, in conjunction with other congenital anomalies. Surgical treatment for this patient population has only been reported in very few cases. In this article, we share our experience in managing a case of unilateral congenital deficiency of anterior cruciate ligament (ACL) in a 13 years old female patient by physeal sparing arthroscopic ACL reconstruction, using All-inside technique.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Chemical Engineering And Processing - Process Intensification
Optimization of a combined electrocoagulation-electro-oxidation process for the treatment of Al-Basra Majnoon Oil field wastewater: Adopting a new strategy
...Show More Authors

View Publication
Scopus (41)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sat Feb 03 2018
Journal Name
Chinese Journal Of Physics
A true random number generator based on the photon arrival time registered in a coincidence window between two single-photon counting modules
...Show More Authors

True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Mar 12 2023
Journal Name
المجلة الدولية للتنمية في العلوم الاجتماعية والإنسانية
the Ottoman Empire in the Nineteenth Century (Iraq as a Model)the Ottoman Empire in the Nineteenth Century (Iraq as a Model)
...Show More Authors

One of the most important features of American foreign activity during the second half of the 19th century was the encouragement of sending Protestant missionary missions to all countries around the world. The mission of these missions was facilitated by the weakened state of the Ottoman Empire, the increasing influence of European countries, and their interference in its internal affairs. Despite the Ottoman efforts to counter the activities of these missions, the American missionary missions adopted a well-planned strategy that suited the conditions of the region, aimed at achieving their goals through direct and indirect methods, including intervention in the field of education. These missions gave great importance to educational aspects

... Show More
View Publication
Publication Date
Sun Sep 01 2024
Journal Name
Results In Engineering
Implementation of a control and monitoring system for a cathodic protection cell to mitigate localized corrosion in fixed and mobile steel structures
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Effect of TNF-Alpha Gene Polymorphisms At -376 G/A, -806 C/T, and -1031 T/C on The Likelihood of Becoming a Non-Responder to Etanercept in A Sample of Iraqi Rheumatoid Arthritis Patients
...Show More Authors

Tumor necrosis factor-alpha (TNF-α) antagonists’ therapy are expensive and has a non-responsive rate between 30% to 40% in rheumatoid arthritis patients. Genetic variation plays a vital role in the responsiveness to this type of therapy.The aim of this study is to investigate if the presence of genetic polymorphism in the TNF-α gene promoter region at locations -376 G/A (rs1800750), -806 C/T (rs4248158), and -1031 T/C (rs1799964) affects rheumatoid arthritis patient's tendency to be a non-responder to etanercept.

Eighty RA patients on etanercept (ETN) for at least six months were recruited from the Rheumatology Unit at Baghdad Teaching Hospital. Based on The European League Against Rheumatism response (EULAR) criteria, patient

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (15)
Scopus Crossref
Publication Date
Sat Oct 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors

Publication Date
Wed Sep 07 2016
Journal Name
Journal Of The Faculty Of Medicine
Non discogenic lumbar radiculopathy ((A study of 104 cases))
...Show More Authors

AW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Oct 15 2014
Journal Name
International Journal Of Advanced Research
A survey/ Development of Passive Optical Access Networks Technologies
...Show More Authors

The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad

... Show More
View Publication Preview PDF