Polycystic ovary syndrome (PCOS) is the most endocrine problem in women of regenerative age. PCOS women typically belong to an age and sex group which is at higher risk for severe coronavirus disease (COVID-19). COVID-19 targets cells through angiotensin-converting enzyme 2 (ACE2) receptor presents on cells in veins, lungs, heart, digestion tracts, and kidneys. Renin-Angiotensin System (RAS) over activity has likewise been described in metabolic disorders; type 2 diabetes mellitus (T2DM), and conditions shared by women with polycystic ovary condition. The point of this study is to know the job of renin and ACE2 in PCOS and coronavirus and its relationship with hormones and other metabolic parameters related. The study groups consist of 120 sample subjects consisting of 80 PCOS-women divided into two groups: - (40 PCOS-women infected with COVID-19 and 40 PCOS-women non-infected with COVID-19) and 40 healthy-women divided into two groups: - 20 women-COVID-19 infected, and 20 women non-COVID-19 infected, ranging in age from 15–40 years old. Renin and ACE2, FBS, lipid profile, level of insulin, HOMA IR, FSH, LH, and testosterone, were measured for all participants. There was an increase in the levels of renin, ACE2, insulin, HOMA-IR, LH, LH / FSH ratio, and testosterone, except HDL and FSH were low when comparing PCOS patients groups with healthy groups. There was a decrease in renin and ACE2 in PCOS women infected with COVID-19 compared with PCOS women non-infection with COVID-19. Infection of COVID-19 and low ACE2 levels lead to respiratory damage and problem in reproductive in PCOS patients. Also, at the same time ACE2 high level in PCOS makes them more risk for coronavirus and is not involved in the cause of PCOS, however renin enzyme may be affected by BMI associated with PCOS.
The article considers semantic and stylistic motivations for using obsolete lexicon (historicisms) in the text of a work of art. The specifics of the functioning of this process are presented against the background of the features of the contemporary Russian literary language. Attention is focused on the fact that the layer of obsolete lexical units belongs to a number of nationally specific vocabulary, the development of which forms an understanding of the nature of the actualized language. In addition, it should be noted that the semantics of historicisms is culturally commensurate: the latter is explained by the fact that the deactuation of linguistic units is positioned as parallel to the sociocultural and political changes.
... Show MoreThe process of granting loans by banks is the confidence they give to their customers, but this trust should not be a cornerstone in granting loans even if granted these loans on the basis of sound banking should involve risks that may be exposed to the bank because of the failure of the client to meet The bank's financial obligations to the bank due to the unexpected economic conditions affecting the customers, which makes them in a state of faltering, which weaken the ability of banks to provide loans, which are the most important sources of revenue and profits, so the problem of non-performing loans is one of the main problems facing most of the banks Which impede the functioning of its work and the reasons that led to the agg
... Show MoreThe research deals with the problem of visual pollution, as it is one of the most important urban problems that cities suffer from. The concept of visual pollution has recently emerged to describe the deformation and degradation of the urban environment. Visual pollution is defined as any component of the surrounding environment that is inconsistent and not homogeneous with its natural and human components. The volume of visual pollution has doubled due to the non-compliance with the laws, regulations and controls set by the Municipality of Baghdad by the citizens, and to the weak municipal role that the municipality plays in implementing these laws. Therefore, it has become necessary to know the manifestations of visual pollution and th
... Show MoreThe subject of the listen to the voice of the customer of topics relatively new in management thought, as it won the attention of many organizations of different types, because it is important to achieve success and to continue and superiority to them, so there is a need to study this term in the Iraqi organizations and try to diagnose the implementation of the study sample to listen voice of the Customer and its
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreThis paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show More