Pituitary adenomas are the anterior pituitary tumors. Patients with an Aryl Hydrocarbon Receptor-Interacting Protein (AIP) mutation (AIP- mut) tend to have more aggressive tumors occurring at a younger age. Single nucleotide polymorphisms (SNPs) in many studies have been related to metabolic comorbidities in the general population. Study aims investigated the role of AIP gene SNPs with susceptibility to acromegaly pituitary- adenoma, with levels of LH, FSH, TSH, Testosterone, IGF1,GH, FT4 , Prolactin hormones and blood sugar levels. The study was conducted on a group of acromegaly patients, including 50 patients) both Genders( with hyperplasia of the ends, and apparently healthy control group. Genotyping of AIP gene SNP (rs641081C >A) was indicated significant differences in frequency percentage between the study groups. The frequency of heterozygous CA genotype was significantly (p<0.01) higher in the patients' group when compared with control. The Means of IGF1, GH, prolactin, testosterone, and FBS were significantly higher in patients at first treatment than that in control. While, the means of IGF1, GH, prolactin, and testosterone increased significantly in patients at last treatment than control. Patients mean level of TSH decreased significantly at last treatment. No significant differences (P ≥ 0.05) were detected between study groups in all other values. The Means of IGF1, GH, and prolactin at first and last treatment were significantly decreased, while LH was significantly increased at last treatment. In patients with heterozygous mutant and wild genotype, means of IGF1, GH, and prolactin decreased significantly at last treatment compared to first treatment. In this study heterozygous rs641081C>A showed a risk factor for susceptibility of acromegaly. Also, serum IGF1, GH, prolactin, were affected by the SNP of AIP gene within carriers of genotypes of rs641081C>A. IGF1, prolactin and GH decreased significantly at last treatment compared to first treatment.
The densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreThis research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai
... Show MorePurpose: The purpose of the study is to compare and evaluate Earnings Management in Tunisia and Iraq. Theoretical framework: Earnings Management is an important topic that has been studied by a significant number of researchers, as well as those who are interested in the accounting profession. Earnings Management has gotten a lot of attention from academics, professionals, and other interested parties in recent years (e.g. Kliestik et al., 2020; Rahman et al., 2021; Gamra &Ellouze, 2021) Design/methodology/approach: The sample includes ten banks listed on the Bourse of Tunisia and Iraq Stock Exchanges for the year 2017. We have used a model of Kothari et al., (2005) as a tool to measure Earnings Management in both mark
... Show MoreApplying a well-performing heat exchanger is an efficient way to fortify the relatively low thermal response of phase-change materials (PCMs), which have broad application prospects in the fields of thermal management and energy storage. In this study, an improved PCM melting and solidification in corrugated (zigzag) plate heat exchanger are numerically examined compared with smooth (flat) plate heat exchanger in both horizontal and vertical positions. The effects of the channel width (0.5 W, W, and 2 W) and the airflow temperature (318 K, 323 K, and 328 K) are exclusively studied and reported. The results reveal the much better performance of the horizontal corrugated configuration compared with the smooth channel during both melti
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More