Background: Recent research indicates that persistent inflammatory responses may contribute to the rise of diabetic nephropathy (DN) and diabetic cardiovascular disease (DCVD) in type 2 diabetes mellitus patients (DM2). Numerous molecules associated with inflammation and angiogenesis have been implicated in the development and progression of DN and DCVD, respectively. Methods: The subjects were separated into five groups: healthy controls (n= 25), type 2 diabetes mellitus patients (n= 30), type 2 diabetes mellitus patients with nephropathy DN (n= 30), and type 2 diabetes mellitus patients with cardiovascular disease DCVD (n= 30). The blood levels of irisin, IL-8, HbA1C, urea, and creatinine were determined. Results: In current study there was high significant increased irisin levels (p< 0.001) in DN patients than other groups and a high significant decreased IL-8 level in DCVD. Discussion: Serum IL-8 and irisin levels may serve as early indicators of DM2 problems (DN, DCVD).
Transforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the pr
... Show MoreHealth service institutions suffer from challenges resulting from the great changes that our world is witnessing today. This has affected the value that these institutions add to the patient.
This research aims to identify the effect of integrating each of the techniques of QFD and value engineering for the health services provided to the patient to improve the value for him and thus obtain his satisfaction, which is reflected in the reputation of the surveyed hospitals. To achieve this, the descriptive analytical method was used, and a questionnaire was designed to collect the necessary data, which represents a measure of this research. The questionnaire was distri
... Show MoreIn this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
The research aims to know the traits or characteristics of woman in terms of her external
appearance, motives for her behavior, feelings, mood and ability.
It, moreover, seeks woman’s relationship with others as it is presented by the Iraqi
satirical television show “ State of Melon “.
The researcher adopted for that survey approach using the method of content analysis
to study the research sample represented by “ State of Melon “ show which was
exposed through the screen of a group of channels:
“Hona Baghdad Satellite Channel, then Asia Satellite Channel, Dijla Satellite Channel,
and UTV Satellite Channel.”For this, the researcher used Margaret Gallagher’s Model to analyze the image of
woman in
Background: The success and maintenance of indirect dental restorations is closely related to the marginal accuracy, which is affected by many factors like preparation design, using of different fabrication techniques, and the time of taking final impression and pouring it. The purpose of this in vitro study was to evaluate the effect of different pouring time of conventional impression on the vertical marginal gap of full contour zirconia crowns in comparison with digital impression technique. Materials and Methods: Forty sound recently extracted human permanent maxillary first premolar teeth of comparable size and shape were collected. Standardized preparation of all teeth samples were carried out to receive full contour zirconia crown re
... Show MoreBackground: The success and maintenance of indirect dental restorations is closely related to the marginal accuracy, which is affected by many factors like preparation design, using of different fabrication techniques, and the time of taking final impression and pouring it. The purpose of this in vitro study was to evaluate the effect of different pouring time of conventional impression on the vertical marginal gap of full contour zirconia crowns in comparison with digital impression technique. Materials and Methods: Forty sound recently extracted human permanent maxillary first premolar teeth of comparable size and shape were collected. Standardized preparation of all teeth samples were carried out to receive full contour zirconia crown re
... Show MoreIn this paper, we have derived Bayesian estimation for the parameters and reliability function of Perks distribution based on two different loss functions, Lindley’s approximation has been used to obtain those values. It is assumed that the parameter behaves as a random variable have a Gumbell Type P prior with non-informative is used. And after the derivation of mathematical formulas of those estimations, the simulation method was used for comparison depending on mean square error (MSE) values and integrated mean absolute percentage error (IMAPE) values respectively. Among of conclusion that have been reached, it is observed that, the LE-NR estimate introduced the best perform for estimating the parameter λ.
Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
The research discusses one of the most critical issues of corporate finance which is related to asset utilization efficiency. Researchers used internal growth rate as independent variable (Proxy of asset utilization efficiency) and sustainable growth rate-dependent variable (proxy of stockholders wealth). According to these two variables, researchers formulate major hypotheses (There is no significant effect of internal growth rate on sustainable growth rate), as well as two sub-hypotheses, examine the components of major variables. Sample of Iraqi industrial companies which listed in the Iraqi stock exchange selected to test and examine main hypotheses. Result of simple and multiple regressions explain there is a significant effect of i
... Show More