Diabetic nephropathy (DN) is the foremost cause of end-stage renal disease. Early detection of DN can spare diabetic patients of severe complications. This study aimed to evaluate the diagnostic value of red cell distribution width (RDW) and neutrophil-lymphocyte ratio (NLR) in the detection of DN in patients with type 2 diabetes mellitus (T2DM). This cross-sectional study included a total of 130 patients with T2DM, already diagnosed with T2DM. The albumin creatinine ratio (ACR) in urine samples was calculated for each patient, according to which patients were divided into two groups: with evidence of DN when ACR ? 30 mg/g, and those with no evidence of DN when ACR < 30 mg/g. According to multivariate analysis, each of disease duration (OR = 4.43, 95% CI = 1.68-11.68, p = 0.003), HbA1c (OR = 6.4, 95% CI = 2.32-17.65, p < 0.001) and NLR (OR = 13.75, 95% CI = 1.68-11.68, p < 0.001) were independent predictors for DN. Using the receiver operating characteristic (ROC) curve to evaluate the diagnostic value of NLR revealed that the AUC was 0.736 (95% CI = 0.635-0.837), p < 0.001. The sensitivity and specificity of the test at the cut-off value of NLR = 3.35 was 69% and 89%, respectively. These data indicate that NLR is a simple non-expensive test that can be used regularly to investigate diabetic patients for the development of DN. Red cell distribution width (RDW), on the other hand, had no diagnostic value in this regard.
Due to the easily access to the satellite images, Google Earth (GE) images have become more popular than other online virtual globes. However, the popularity of GE is not an indication of its accuracy. A considerable amount of literature has been published on evaluating the positional accuracy of GE data; however there are few studies which have investigated the subject of improving the GE accuracy. In this paper, a practical method for enhancing the horizontal positional accuracy of GE is suggested by establishing ten reference points, in University of Baghdad main campus, using different Global Navigation Satellite System (GNSS) observation techniques: Rapid Static, Post-Processing Kinematic, and Network. Then, the GE image for the study
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe process of discovering pharmaceuticals is of great importance in our contemporary life, in a way that without life becomes almost impossible, as this process is the first building block in the field of pharmaceutical industries to search for new methods and means of treatment and treatment. But in fact, the fact that talking about this process is not that simple and easy, because this process is complicated and difficult in a way that makes it take a time range that in some cases reaches what is permissible ten years to reach a chemical formula that can be used later in the manufacturing process Pharmacokinetics, and during this long period of time, this process will have a set of effects, some of which are specific to the researcher di
... Show MoreFreedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.
Predicting vertical stress was indeed useful for controlling geomechanical issues since it allowed for the computation of pore pressure for the formation and the classification of fault regimes. This study provides an in-depth observation of vertical stress prediction utilizing numerous approaches using the Techlog 2015 software. Gardner's method results in incorrect vertical stress values with a problem that this method doesn't start from the surface and instead relies only on sound log data. Whereas the Amoco, Wendt non-acoustic, Traugott, average technique simply needed density log as input and used a straight line as the observed density, this was incorrect for vertical computing stress. The results of these methods
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show More