Diabetic nephropathy (DN) is a principle cause of microangiopathy and the main reason for kidney disease at the end stage in patients with type 2 diabetes mellitus (T2DM). This work aimed to study the relation of pentosidine with kidney injury in the case of diabetic nephropathy. This study included 75 patients suffering from T2DM and 75 apparently healthy subjects. The patients group was divided into three groups ((normoalbumin, microalbuminuria, and macroalbuminuria; 25 patients for each) on the basis of albumin-creatinine ratio (ACR) . The level of serum pentosidine was determined using an ELISA kit. The level of pentosidine was found to be significantly higher in DN patients than in the healthy group. Also, the results revealed a str
... Show MoreThe current work aims to evaluate the association between genetic mutations in thymidylate synthetase (
In this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted in the theoretical cross section and compared with the experimental data for nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Allah's wisdom has necessitated concentrating un human nature the ability of
mediation and forethought .among the aspect of this ability is the recognition of the
relationship between causes and effects issues and reasons behind them and the
sensing of similarities and differences and distinguish the connection between the
subjects and characteristics and the innate perception of material and immaterial good
and bad.
Allah's wisdom has willed not to make his law away from the nature of people of
discovering the relationship between things and their causes, or similarity between
things and their counterparts to use the Quranic text to convince reason and to enable
reason to realize the wisdom quranic text within
The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreResponse surface methodology (RSM) based on central composite design was successfully applied to redesign MRS media for maximizing both biomass and bacteriocin production from Lactobacillus plantarum NH40. First, glucose and yeast extract were chosen as the best carbon and nitrogen sources based on classical optimization results of one factor at time which also revealed the possibility of eliminating peptone and meat extract from the original composition of medium without affecting the growth and bacteriocin production. Statistical experimental design based on a regression model generated using the Design expert 7 software showed that the optimum concentrations of glucose, yeast extract, tween80, NH4Cr, CH