Background: The majorities of statin-treated patients, in whom low-density lipoprotein cholesterol (LDL-C) targets have been achieved, have had recurrent cardiovascular events (CVE) with an absolute rate remain even higher among patients with disorders of insulin resistance, metabolic syndrome (MetS) and type2 diabetes mellitus (T2DM) as compared to patients devoid of these conditions.Objectives: Provide updated key messages of lipid and lipoprotein abnormalities as indicator for cardiovascular disease (CVD) risk in patients with T2DM and obesity, as well as the current evidence-based treatment targets and interventions to reduce this risk.Key messages: The Residual Risk Reduction Initiative (R3I) emphasized atherogenic dyslipidemia (AD)
... Show MoreThe value of culture in its interaction is composed and formulated according to compatible and incompatible roles which view the identity that adopts that formation although it is in most cases perceived and declared. The attraction and difference characteristic might be implied within subjective and procedural meaning through which it seeks to make the identity mobile subject to identity- shaping cultural causes implying the conflicts that take the shape and culture of real time. As for the end of the twentieth century and afterward where the concepts of hegemony, globalization, cultural invasion, colonial and imperial culture, all these causes made the cultural identity concept appear on the surface of the critical studies as a
... Show MoreThe research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe propaganda discourse is the most widely circulated in the media and communication studies, where the interest of scholars and researchers in this field has become clear in the analysis and interpretation of the content of this discourse, to identify the intentions, purposes and objectives of the communicator activity, which exceeded the borders of states in the heated atmosphere of rivalries and political conflicts that characterize The countries of the world as a whole and for many years.
In particular, the economically and militarily developed countries (the Nordic capitalist countries) have exerted special efforts in the production of information and ideas, using advanced methods and means in all details of communication w
... Show MoreThe Umayyad era is characterized by the diversity of the subjects and their multiplicity in the literary phenomena. These phenomena are singing phenomena, although they were known in previous eras, they took a distinctive form in the era.
In this light, the researcher tried to prove that singing theory in the Umayyad period was characterized by development and renewal. The research was entitled (evolution and renewal in the theory of singing in the Umayyad era).