Background: The highest concentrations of
blood glucose during the day are usually found
postprandialy. Postprandial hyperglycemia (PPH)
is likely to promote or aggravate fasting
hyperglycemia. Evidence in recent years suggests
that PPH may play an important role in functional
& structural disturbances in different body organs
particularly the cardiovascular system.
Objective: To evaluate the effect of (PPH) as a
risk factor for coronary Heart disease in Type 2
diabetic patients.
Methods: Sixty-three type2 diabetic patients
were included in this study. All have controlled
fasting blood glucose, with HbA1c correlation.
They were all followed for five months period
(from May to October 2008)
Solar activity monitoring is important in our life because of its direct or indirect influence on our life, not only on ionospheric communications. To study solar activity, researchers need measuring and monitoring instruments, these instruments are mostly expensive and are not available in all universities. In this paper, a very low frequency radio receiver had been designed and implemented with components available in most markets to support the researchers, college students, and radio astronomy amateurs with a minimum input voltage less than 100µV, an output voltage less than 135 m V with no distortion and an overall gain of 34dB. A comparison had been done between two circuit structures using a workbench software program and experim
... Show MoreGeotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)
... Show MoreThis work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video
... Show MoreThe development of a reversed phase high performance liquid chromatography fluorescence method for the determination of the mycotoxins fumonisin B1 and fumonisin B2 by using silica-based monolithic column is described. The samples were first extracted using acetonitrile:water (50:50, v/v) and purified by using a C18 solid phase extraction-based clean-up column. Then, pre-column derivatization for the analyte using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol was carried out. The developed method involved optimization of mobile phase composition using methanol and phosphate buffer, injection volume, temperature and flow rate. The liquid chromatographic separation was performed using a reversed phase Chromolith® RP-18e column
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThe definition of "prostitute" and prostitution is a difficult one and a
question over which the legislators of many lands and nations differed. A
notable feature of prostitution is its epidemic increase at times of war,
revolution and armed commotion, on account of economic, social and
psychological factors generated by such conditions of mortal conflicts. Wars
invariably deprive young wives and lovers of their men folk, resulting in
financial , sexual and emotional frustrations . At no time is the natural
balance between the sexes more seriously disturbed than during wars, when
thousands of men are thrown into one sector of the country and hundreds of
towns and villages are left to women and children only. Lo
The modern stylistic lesson has become more committed to the scientific limits in which it believed, and more confident in itself, and it is no longer just a scientific procedure that helps other curricula and sciences that preceded it.
Based on this, our modest research ((a stylistic vision of the objection in the Quranic discourse)) arose to explore an artistic rhetorical phenomenon that was included in the Holy Quran text. ; Because analysis is a situation that allows us to see a lot and absorb the stranger more clearly.
And since the horizontal arrangement of the linguistic elements in which stylistically undistinguished elements meet with distinct ones, the other trend has emerged that believes that the stylistic dis
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More