Preferred Language
Articles
/
bijps-488
Measurements of HbA1c for Patients with Diabetes Mellitus and Foot Ulceration
...Show More Authors

People with diabetes can develop different foot problems. In the blood stream glucose reacts with hemoglobin to make a glycosylated hemoglobin molecule called hemoglobin A1c or HbA1c, the more glucose in the blood the more hemoglobin A1c will be present in the blood. The HbAlc test is currently one of the best ways to check diabetes to be under control.  The aim of study is to compare between the blood investigations which includes the fasting blood sugar and HbAlC (glycosylated hemoglobin), and to evaluate the benefit of  HbAlc (measurement for diabetic patients with foot ulcer,  to be a good indicator for controlling blood glucose). Sixty patients with type2 diabetes mellitus from the outpatient clinic of Baghdad Teaching Hospital, Medical City over the period from Nov. 2006 to Nov. 2008, were included in the study. Follow up was done only to 30 patients with diabetic foot ulcer. Twenty (66.66%) were males and 10(33.33%) were females their age range from (23-75) years (mean age of 52years), and 21 normal subjects as control. A (Glycohemoglobin HbAl-Test/fast lon-Exchange Resin Separation Method) kit was used. The data finding that there is a greater association between HbAlc level and foot ulceration healing. There is a relationship between the age of the patients and the HbAlc level. The patients who used (Glibenclamide+Metformin) have the lower range of HbAlC, while those who use (Metformin) have the higher level of HbAlc. HbAlc (glycosylated hemoglobin) is most accurate test to determine actual reading over the past 2-3 months, and to evaluating the risk of glycemic damage to the tissues. So, we recommend the HbAlc testing, but it can't be used to monitor day-to-day blood glucose concentration because it's not influenced by fluctuation in blood concentration.

Key words: Diabetic foot ulcer, HbAlc

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Sat Mar 26 2022
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
Major Drivers for COVID-19 Vaccine Acceptance: A Scoping Review
...Show More Authors

Objective: To review and identify the major drivers for COVID-19 vaccine acceptance. Methods: A scoping review of studies of COVID-19 vaccine perceptions and barriers to using the COVID-19 vaccines. Two search engines, including PubMed and Google Scholar, were purposefully searched. Results: Eight studies from different countries were reviewed to categorize factors influencing people's acceptance of COVID-19 according to the Health Belief Model (HBM). Perceived susceptibility, and severity of the disease (COVID-19), in addition to perceived benefits of COVID-19 vaccination and "cues to action", can enhance vaccination acceptance. In contrast, perceived barriers to the COVID-19 vaccine can increase people's hesitancy to be vaccinated

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Estimation for Carbonate Reservoir (Case Study/ South Iraqi Field)
...Show More Authors

     The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units. Evaluation of reservoir characterization  was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) and global hydraulic elements (GHE

... Show More
Crossref (3)
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Al-mansoor College
An Improvement to Face Detection Algorithm for Non-Frontal Faces
...Show More Authors

Publication Date
Sat Jun 01 2019
Journal Name
Al-nahrain Journal Of Science
THREE DIMENSIONAL EXPLICIT MODEL FOR COMETARY TAIL IONSINTERACTIONSWITH SOLAR WIND
...Show More Authors

The different interactions between cometary tail and solar wind ions are studied in the present paper based on three-dimensional Lax explicit method. The model used in this research is based on the continuity equations describing the cometary tail-solar wind interactions. Three dimensional system was considered in this paper. Simulation of the physical system was achieved using computer code written using Matlab 7.0. The parameters studied here assumed Halley comet type and include the particle density , the particles velocity v, the magnetic field strength B, dynamic pressure p and internal energy E. The results of the present research showed that the interaction near the cometary nucleus is mainly affected by the new ions added to the

... Show More
Publication Date
Sat Jan 03 2015
Journal Name
Journal Of Engineering And Development
3D Presentation for Baghdad University Buildings Using Total Station Device
...Show More Authors

capable of the measuring with a high degree of precision in a single instrument. Total stations device are used for station setting up, setting-outmany points from one station. Their major purpose of this work is to take advantage of total station for setting up building and to establish 3D representation using AutoCAD program. The area of the study was Civil Engineering Department at Baghdad University campus AL Jadiriyah. The completion of the work is done in two stages; 1. The field work: In this stage, the Total Station Nikon Nivo-5C was selected for the current study. This device was measured horizontal and vertical distance, elevations, and coordinates from a single set up. This data directly stored on memory. 2. The office work: In t

... Show More
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Highly-Performed Fuzzily-logicized Edge Detecting Algorithm for Noisy Handwritings
...Show More Authors

The main targets for using the edge detection techniques in image processing are to reduce the number of features and find the edge of image based-contents. In this paper, comparisons have been demonstrated between classical methods (Canny, Sobel, Roberts, and Prewitt) and Fuzzy Logic Technique to detect the edges of different samples of image's contents and patterns. These methods are tested to detect edges of images that are corrupted with different types of noise such as (Gaussian, and Salt and pepper). The performance indices are mean square error and peak signal to noise ratio (MSE and PSNR). Finally, experimental results show that the proposed Fuzzy rules and membership function provide better results for both noisy and noise-free

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
...Show More Authors

View Publication
Crossref (13)
Scopus Clarivate Crossref