Diabetic nephropathy (DN) is the foremost cause of end-stage renal disease. Early detection of DN can spare diabetic patients of severe complications. This study aimed to evaluate the diagnostic value of red cell distribution width (RDW) and neutrophil-lymphocyte ratio (NLR) in the detection of DN in patients with type 2 diabetes mellitus (T2DM). This cross-sectional study included a total of 130 patients with T2DM, already diagnosed with T2DM. The albumin creatinine ratio (ACR) in urine samples was calculated for each patient, according to which patients were divided into two groups: with evidence of DN when ACR ? 30 mg/g, and those with no evidence of DN when ACR < 30 mg/g. According to multivariate analysis, each of disease duration (OR = 4.43, 95% CI = 1.68-11.68, p = 0.003), HbA1c (OR = 6.4, 95% CI = 2.32-17.65, p < 0.001) and NLR (OR = 13.75, 95% CI = 1.68-11.68, p < 0.001) were independent predictors for DN. Using the receiver operating characteristic (ROC) curve to evaluate the diagnostic value of NLR revealed that the AUC was 0.736 (95% CI = 0.635-0.837), p < 0.001. The sensitivity and specificity of the test at the cut-off value of NLR = 3.35 was 69% and 89%, respectively. These data indicate that NLR is a simple non-expensive test that can be used regularly to investigate diabetic patients for the development of DN. Red cell distribution width (RDW), on the other hand, had no diagnostic value in this regard.
The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreThe influence of Cr3+ doping on the ground state properties of SrTiO3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the band ga
... Show MoreAbstract: The development of highly sensitive sensors has become an efficient field of research. In this work, an ArF Excimer laser of 193 nm with a maximum pulse energy of 275 mJ, 15 ns pulse duration and a repetition rate of 1 Hz is utilized to form a Laser Induced Periodic Surface Structures (LIPSS) of three different morphologies (nanochains, contours, grooves) on surface of CR39 polymer at a fluence range above the ablation threshold (250 mJ/cm2). The laser ablated polymer surface is then Surface Enhanced Raman Scattering (SERS) activated by deposition of a gold layer of 30 nm thickness. The capability of the produced substrate for surface enhanced Raman scattering is evaluated through thiophenol as an analyte molecule. It is observ
... Show MoreDespite the principle of separation of powers brought by the French Revolution, which entrusted the task of drafting legislation and its amendment to the legislative authority and the task of settling disputes and settling them in the judiciary. However, since that date, the French judiciary has played a major role in the development of French civil law (In spite of all the economic and social developments that have taken place in French society throughout these years) since its promulgation until February of 2016, the date of the Legislative Decree No. 131 of the year 2016 A modification is the largest in the history of the French Civil Code (which was the judicial precedents in which a significant impact), was assisted by the French judic
... Show MoreIn the present study, a low cost adsorbent is developed from the naturally available sawdust
which is biodegradable. The removal capacity of chromium(VI) from the synthetically prepared
industrial effluent of electroplating and tannery industrial is obtained.
Two modes of operation are used, batch mode and fixed bed mode. In batch experiment the
effect of Sawdust dose (4- 24g/L) with constant initial chromium(VI) concentration of 50 mg/L and
constant particle size less than1.8 mm were studied.
Batch kinetics experiments showed that the adsorption rate of chromium(VI) ion by Sawdust
was rapid and reached equilibrium within 120 min. The three models (Freundlich, Langmuir and
Freundlich-Langmuir) were fitted to exper
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.