Background: Most prevalent chronic liver disease in developed and developing nations is non-alcoholic fatty liver disease. From fatty liver, which often has benign, non-progressive clinical history, to non-alcoholic steatohepatitis, a more serious variant of fatty liver that can lead to cirrhosis and end-stage liver disease, non-alcoholic fatty liver disease encompasses broad spectrum of diseases. The gold standard for determining extent of hepatic fibrosis is still liver biopsy; however, number of noninvasive tests have been established to make diagnosis and assess effectiveness of treatment.
Objective: Aim of study was to assess effectiveness of the combination of fibroscan and
... Show MorePreviously, many empirical models have been used to predict corrosion rates under different CO2 corrosion parameters conditions. Most of these models did not predict the corrosion rate exactly, besides it determined effects of variables by holding some variables constant and changing the values of other variables to obtain the regression model. As a result the experiments will be large and cost too much. In this paper response surface methodology (RSM) was proposed to optimize the experiments and reduce the experimental running. The experiments studied effects of temperature (40 – 60 °C), pH (3-5), acetic acid (HAc) concentration (1000-3000 ppm) and rotation speed (1000-1500 rpm) on CO2 corrosion performance of t
... Show MoreIn this work, the adsorption of crystal violet dye from aqueous solution on charcoal and rice husk has been investigated, where the impact of variable factors (contact time; the dosage of adsorbent, pH, temperature, and ionic strength) have been studied. It has been found that charcoal and rice husk have an appropriate adsorption limit with regards to the expulsion of crystal violet dye from fluid arrangements. The harmony adsorption is for all intents and purposes accomplished in 45 min for charcoal and 60 min for rice husk. The amount of crystal violet dye adsorbed (0.4 g of charcoal and 0.5 g of rice husk) increased with an increasing pH and the value of 11 is the best
... Show MoreThis article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.
Stripping is one of the major distresses within asphalt concrete pavements caused due to penetration of water within the interface of asphalt-aggregate matrix. In this work, one grade of asphalt cement (40-50) was mixed with variable percentages of three types of additives (fly ash, fumed silica, and phosphogypsum) to obtained an modified asphalt cement to resist the effect of stripping phenomena .The specimens have been tested for physical properties according to AASHTO. The surface free energy has been measured by using two methods namely, the wilhelmy technique and the Sessile drop method according to NCHRP-104
procedures. Samples of asphalt concrete using different asphalt cement and modified asphalt cement percentages(4.1,4.6 an
In this article the unsteady magnetohydrodynamics oscillating flow of third order fluid with free stream velocity is proposed. It is found that the motion equation is controlled by five dimensionless parameters namely the coecostic parameter 4, viscoelostic parameter ?,acceleration/deceleration c,suction/blowing d and material constants ? . The effect of each of these parameters upon the velocity distribution is analysised
This paper develops the work of Mary Florence et.al. on centralizer of semiprime semirings and presents reverse centralizer of semirings with several propositions and lemmas. Also introduces the notion of dependent element and free actions on semirings with some results of free action of centralizer and reverse centralizer on semiprime semirings and some another mappings.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More