Background: Bone mineral density (BMD) has been assessed using Dual-Energy X-ray absorptiometry (DEXA). This procedure is considered to be of vital importance in assessing the general condition of individuals concerning their skeletal mineralization. BMD is measured according to the results of the DEXA examination of the vertebral column and pelvis. Although diabetes mellitus (D.M.)is known to affect BMD, the information regarding this relationship is not currently particularly clear. Objective: This study concentrates on the point that the assessment of BMD for the vertebral column is insuffi-cient to give a realistic and correct picture of the mineralization of the remaining part of the skeleton. Besides, this study elicited a generalized view of the mineralization of the different body parts between genders and between the left and right sides of the body. The effect of DM I on BMD was evaluated well in this research. Method: This study involved 165 patients complaining of bone pain (85 male and 80 female), about half of whom suffered from diabetes, involving both genders. Further, 90 healthy volunteers had been studied and were considered to constitute the control group. All individuals (255) in this study were exposed to the study of their BMD via DEXA for all parts of the body. Results: The DEXA exam revealed highly statistically significant differences between the sides of the body in the same subject. In addition, there were significant differences in BMD between females and males and highly statistically significant differences between the control and patient groups with DM I. Finally, this study offered strong evidence that the BMD of the vertebral column and pelvis did not give an accurate picture of mineralization in the different parts of the body for a given subject. In conclusion, the DEXA scan for the whole body and each part separately shows promising results as alternative parameters of the DEXA scan for the spine or hip only for accurate diagnosis. Our results indicate that the BMD of the left and right sides for women was less than for men in all cases (average, osteoporosis, and DMI with osteoporosis) for the same sides and between their upper and lower limbs. Patients with DMI revealed significant reductions in BMD in comparison with other subjects who were not diabetic, even if they had osteoporosis. Keywords: DEXA scan, Osteoporosis, DMI, BMD
In this paper, we define a cubic bipolar subalgebra, $BCK$-ideal and $Q$-ideal of a $Q$-algebra, and obtain some of their properties and give some examples. Also we define a cubic bipolar fuzzy point, cubic bipolar fuzzy topology, cubic bipolar fuzzy base and for each concept obtained some of its properties.
The public procurement crisis in Iraq plays a fundamental role in the delay in the implementation of construction projects at different stages of project bidding (pre, during, and after). The procurement system of any country plays an important role in economic growth and revival. The paper aims to use the fuzzy logic inference model to predict the impact of the public procurement crisis (relative importance index and Likert scale) was carried out at the beginning to determine the most important parameters that affect construction projects, the fuzzy analytical hierarchy process (FAHP) to set up, and finally, the fuzzy decision maker's (FDM) verification of the parameter for comparison with reality. Sixty-five
... Show MorePolymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIron–phthalocyanine (FePc) organic photoconductive detector was fabricated using pulsed laser deposition (PLD) technique to work in ultraviolet (UV) and visible regions. The organic semiconductor material (iron phthalocyanine) was deposited on n-type silicon wafer (Si) substrates at different thicknesses (100, 200 and 300) nm. FePc organic photoconductive detector has been improved by two methods: the first is to manufacture the detector on PSi substrates, and the second is by coating the detector with polyamide–nylon polymer to enhance the photoconductivity of the FePc detector. The current–voltage (I–V) characteristics, responsivity, photocurrent gain, response time and the quantum efficiency of the fabricated photoconduc
... Show MoreIn this paper, we study the incorporation of the commensalism interaction and harvesting on the Lotka–Volterra food chain model. The system provides one commensal prey, one harvested prey, and two predators. A set of preliminary results in local bifurcation analysis around each equilibrium point for the proposed model is discussed, such as saddle-node, transcritical and pitchfork. Some numerical analysis to confirm the accruing of local bifurcation is illustrated. To back up the conclusions of the mathematical study, a numerical simulation of the model is carried out with the help of the MATLAB program. It can be concluded that the system's coexistence can be achieved as long as the harvesting rate on the second prey population is
... Show MoreThis research presents a numerical study to simulate the heat transfer by forced convection as a result of fluid flow inside channel’s with one-sided semicircular sections and fully filled with porous media. The study assumes that the fluid were Laminar , Steady , Incompressible and inlet Temperature was less than Isotherm temperature of a Semicircular sections .Finite difference techniques were used to present the governing equations (Momentum, Energy and Continuity). Elliptical Grid is Generated using Poisson’s equations . The Algebraic equations were solved numerically by using (LSOR (.This research studied the effect of changing the channel shapes on fluid flow and heat transfer in two cases ,the first: cha
... Show MoreDue to the Geographical links, language is one of the multiple affects among Arabs and Turks. As the different studies demonstrate, Turkish contains many words derived from other languages, yet Arabic remains the language that has great affects on Turkish. Unlike Turkish language, Arabic is a derivative language that requires no suffixes. Thus, Arabic verbs are tuned into Turkish verbs by adding auxiliary verbs. The present study traces some of the Turkish compound words of Arabic roots with an explanation that shows the Auxiliary added to form the Turkish verb as found in the stories of Otman Chevek Sawy’s Like A voice in the Dark. The conclusion sums up the findings of the study illustrated by numbers.
Özet<
... Show MoreThis research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p
... Show More