The aim of this study was investigating the correlation between elevation of Prolactin levels and the increase of the concentrations of total sialic acids. The study was performed on 149 women consisted of 93 infertile hyperprolactinimic women (patients), age ranged16-38 years old, and 56 normoprolactinemic women as a control group, 18-37 years old. Serum prolactin (PRL) and gonadotroph hormones (Follicle stimulating hormone FSH and Luteinizing hormone LH) were measured using enzymatic immunoassay (EIA) method, resorcinol method for serum total sialic acids (SIA). Patients were divided into four groups, each group represented the level of prolactin of infertile women as follow: G1= (21-30), G2= (31-40), G3= (41-50), and G4= (51-60) ng/mL. Serum PRL levels in the patients groups were significantly(P≤0.05) elevated compared to the normal women. Serum SIA, FSH and LH levels showed no significant differences (P≤0.05) in the groups 1, 2, 3, and 4 when compared to healthy women (control). There was no correlation between serum prolactin hormone levels and SIA levels in the control and patients women. In conclusion there was an elevation in PRL levels, not combined with elevation in SIA, FSH, and LH levels. There was no correlation between elevation of PRL levels and total sialic acids concentrations in control and patients women. Thus, sialic acid has no correlation with the fertility or infertility in the women.
Background The escalating global concern over increased body weight in adolescents, coupled with the rising rates of adolescent pregnancy worldwide, presents a significant challenge to healthcare systems. We plan to identify the maternal and neonatal consequences associated with pre-pregnancy overweight in adolescent women. Methods Throughout five years, all singleton adolescent pregnant women with pre-pregnancy self-reported body mass index (BMI) of 18.5– ≤ 29.9 were involved during the first-trimester visit. Two groups were generated: overweight and appropriate-weight (BMI 25–29.9 and 18.5–24.9, respectively). Obstetric and neonatal outcomes were observed prospectively and statistically adjusted for the confounding factors.
... Show MoreThe work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows: with
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show MoreThe topic of supra.topological.spaces considered one of the important topics because it is a generalization to topological.spaces. Many researchers have presented generalizations to supra open sets such as supra semi.open and supra pre.open sets and others. In this paper, the concept of δ∼open sets was employed and introduced in to the concept of supra topology and a new type of open set was extracted, which was named S∼δ∼open. Our research entails the utilization of this category of sets to form a new concepts in these spaces, namely S∼δ∼limit points and S∼δ∼derive points, and examining its relationship with S∼open and S∼reg∼open. Based on this class of sets, we have introduced other new concepts such as S∼isolate
... Show MoreAugust Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreThe Turkish intervention in the Libyan crisis in the recent period was a trigger for more tension than a solution - as Turkey claims - as Turkey seeks to quickly set a welcome military footing in Libya to prevent the reconciliation government from falling and planning to start exploration for gas and oil in Libya to solve the Turkish energy crisis, that is, the energy exchange for security and trying to exploit the situation to establish a new gathering of proTurkish political Islam, as for the Iranian position on the Libyan crisis, it does not exceed a logistical role and provide Turkey with expertise in circumventing international sanctions and assisting it in transporting fighters and weapons to Libya, Iran has also deliberately added so
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MorePhysicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i
... Show More