Background: The majorities of statin-treated patients, in whom low-density lipoprotein cholesterol (LDL-C) targets have been achieved, have had recurrent cardiovascular events (CVE) with an absolute rate remain even higher among patients with disorders of insulin resistance, metabolic syndrome (MetS) and type2 diabetes mellitus (T2DM) as compared to patients devoid of these conditions.Objectives: Provide updated key messages of lipid and lipoprotein abnormalities as indicator for cardiovascular disease (CVD) risk in patients with T2DM and obesity, as well as the current evidence-based treatment targets and interventions to reduce this risk.Key messages: The Residual Risk Reduction Initiative (R3I) emphasized atherogenic dyslipidemia (AD)
... Show MoreExplainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreThe unemployment is considered from the most danger problems that our society face them in current time & in the near future , because it makes prodigality for element of human being , particularly age of youth who have ability to work & producing , that resulted in negative effects forecast to dire consequences social and economical dangers . In the same time as will be stated in our explanation in the following in our research , because the unemployment has ability to help to prepare good environment to grow crime , actions of violence that mostly are main cause to decrease living level of majority of citizens & in increasing numbers who became under poverty , the unemployment is economical problem as it is psycholo
... Show MoreThis study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap
... Show MoreMauddud Formation (Albian stage-the Early Cretaceous) is an important oil reservoir in Ratawi field of southern Iraq. Four wells, R T-2, R T-3, R T-6, and R T-7, located 70 km northwest of Basra, were selected to study microfacies properties and petrophysical associations with the probability of oil production. Seventy-seven core samples are collected, and thin sections for petrographic analysis. The self-potential, Gamma-ray, resistivity, and porosity logs are used to determine the top and bottom of the Mauddud Formation. Water saturation of the invaded and uninvaded zones, shale volume, and porosity were calculated. The study area results showed that the quantity of shale is less than 15% for most of the wells, and the dominant po
... Show MoreThe research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreTraditionally, style is defined as the expressive, emotive or aesthetic emphasis added linguistically to the discourse with its meaning is the same. In the current study, however, style is defined as the linguistic choice that the language users can make for specific purposes.
This study, thus, aims at analyzing political Arabic and English speeches to find out whether there are differences of style between English and Arabic and whether the choices the language users make can show any traits of their psychological status.
To fulfill the above aims, the study hypothesizes that English and Arabic speeches can be analyzed stylistically and that there are stylistic difference
... Show More