Diabetic kidney disease (DKD) is caused by a variety of processes. As a result, one biomarker is insufficient to represent the complete process. This study Evaluate the diagnostic value of serum kidney injury molecule-1(KIM-1) and cystatin C (CysC) as early biochemical markers of DKD and predictive their sensitivities and specificities as biomarkers of nephropathy in Iraqi type 2 diabetic (T2DM) patients. This cross-sectional study include 161 T2DM patients from Diabetes and Endocrinology Center at Merjan medical city in Babylon. Patients divided according to urinary albumin creatinine ratio(ACR) (Group1:ACR≤30mg/g,Group2:ACR>30mg/g). Random spot urine and fasting blood samples were taken from each patient and urinary ACR, blood glycated hemoglobin(HbA1c), and serum glucose, creatinine(SCr), lipid profile, CysC, KIM-1 were assayed, and the estimated glomerular filtration rat (eGFR) was calculated. When compared to the normoalbuminuric group, the DKD group had significantly greater prevalence of retinopathy, and significantly elevated HbA1c and total cholesterol values. Also had significantly greater serum levels of KIM-1 and CysC, and there is a significant (P-value< 0.01) positive correlation between them. In contrast, GFR was significantly higher in normoalbuminuric group and was significantly negatively correlated with both CysC and KIM-1. Multiple linear regression analysis, found that there were a significant positive association between CysC, KIM-1 and ACR. ROC analysis reveal that eGFR had the highest area under the curve(AUC=0.717), while SCr had the lowest AUC(0.556). In conclusion, Serum KIM-1 and CysC levels consider as early biomarker for DKD along with eGFR that consider the best diagnostic indicator of DKD, Additionally, there is a strong correlation between serum CysC and KIM-1 as well as other renal measures that indicate deteriorating kidney function.
The features of strategic thought transformation in Russia based on attempt confirm the Russian influenced on Region of Eastern Europe through series of common defense treaties and mutual security between USSR and another states this treaties emphasis size on direct Russian supervision on these states in addition, Russia in trusted to formation communism regimes in its vital space, Russia inherited the status of former USSR in political and economic levels.
Shortly we can see that Russia witnessed large Transformation in political strategic thought as a result of change in internal strategic environment and change of nature understanding which influenced on Russia. This
... Show More
The present article concerns one of the objects of media sociology under construction. The transformation of the rites in the use of the television contents in the era of digital technologies and media convergence. By an analytic contextual approach, based on the study of the uses, we formulate the following hypothesis: so many changes in the rites of uses are real, in particular at the young people, so, many pieces integer of the everyday life remain impervious to these changes, and it is true under the influence of a slowness of the social and cultural orders, rooted for a long time in the traditional social fabric. We shall then try to bring a sociological look to this societal, cultural, and communicational object that is the pas
The most common cause of upper respiratory tract infection is coronavirus, which has a crown appearance due to the existence of spikes on its envelope. D-dimer levels in the plasma have been considered a prognostic factor for COVID-19 patients.
The aim of the study is to demonstrate the role of COVID-19 on coagulation parameters D-dimer and ferritin with their association with COVID-19 severity and disease progression in a single-center study.
The study was carried out at field agriculture in Baghdad–Iraq in 2015. For purpose evaluated the performance the selected implements tillage, suitable tire pressure and speed tractor under silt clay loam to measured Effective field capacity, Actual Time for plowing One Donam ( hr), Appearance Tillage ( number of clods > 10 cm), Fuel consumption measure in two unit (L/Donam and L/hr) and Machinery Unit Energy Requirement ( kw.hr / Donam). Split – split plot design under randomized complete block design with three replications using Least Significant Design 5 % was used. Three factor used in this experiment included Two types of plows included Chisel and Disk plows which represented main plot, Three Tires Inflation Pressure was second fa
... Show MoreAbstract:
The Iraqi economy faces complex economic challenges that threaten the prospects for growth and stability in the short and medium term, The decrease in oil revenues on which Iraq is based in financing its total expenditure, both operational and investment, led to the emergence of a deficit in the government budget, As the global oil price crisis affected the revenues of the Iraqi government negatively, especially as this negative impact coincided with the increase in military spending resulting from Iraq's war against terrorism, Which led to the Iraqi government to implement austerity measures were to reduce public spending on several projects, which are less important compared to projects that a
... Show MoreIn This paper, we have been approximated Grűnwald-Letnikov Derivative of a function having m continuous derivatives by Bernstein Chlodowsky polynomials with proving its best approximation. As well as we have been solved Bagley-Torvik equation and Fokker–Planck equation where the derivative is in Grűnwald-Letnikov sense.
Andalusian women enjoyed much historical news in the fluorescence of Andalusia, describing it as beautiful and good cohabitation, as the men were involved in conquests, including those who were wives of the caliphs, including scientists, singers, and adept writers Hassan and tongue, in addition to the acquisition of masters in slave markets in Cordoba, Seville and many cities, In addition, Andalusian women enjoy freedom in their relationship with men and have been reflected in the historical fluorescence of Andalusia, such as the book of the history of Ibn Abdul Malik bin Habib al-Alberi (d. And the collar of the dove repented in intimacy and thousands of Ibn Hazm al-Qurtubi (d. 456 AH / 1065 CE), the book of Hilla al-Sayra of Ibn al-Wel
... Show MoreBackground: The undergraduate students in pharmacy colleges represent a well-educated group of thecommunity according to the use of drugs and they are required to hold the appropriate knowledge of druguse and have positive attitudes toward health problems, this good knowledge about the diseases and theirtreatment will give good pharmacists in the future and this will reflect positively on patient knowledge, andtheir compliance with treatment, this due to direct contact of pharmacists with the patients.Aim: To know the knowledge, Awareness and Attitude of a sample of Iraqi pharmacy students towardsepilepsy.Method: Cross-sectional study used a structured questionnaire validated by previous studies to collectdata about knowledge, Aware
... Show MoreIn this paper we give definitions, properties and examples of the notion of type Ntopological space. Throughout this paper N is a finite positive number, N 2. The task of this paper is to study and investigate some properties of such spaces with the existence of a relation between this space and artificial Neural Networks (ïNN'S), that is we applied the definition of this space in computer field and specially in parallel processing
Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show More