Aim of the study is to find any correlation between obesity (insulin resistance) and type I diabetes in children. Obesity and diabetes mellitus are the common health problems, and obesity is common cause of the insulin resistance. The results revealed marked increased in glucose, insulin, HbAlc and insulin resistance in obese diabetic type I patients comparing to control group they were obese and non-obese found to be within normal values for glucose, insulin, FIbAlc , and insulin resistance.
Background: Bilastine (BLA) is a second-generation H1 antihistamine used to treat allergic rhinoconjunctivitis. Because of its limited solubility, it falls under class II of the Biopharmaceutics Classification System (BSC). The solid dispersion (SD) approach significantly improves the solubility and dissolution rate of insoluble medicines. Objective: To improve BLA solubility and dissolution rate by formulating a solid dispersion in the form of effervescent granules. Methods: To create BLA SDs, polyvinylpyrrolidone (PVP K30) and poloxamer 188 (PLX188) were mixed in various ratios (1:5, 1:10, and 1:15) using the kneading technique. All formulations were evaluated based on percent yield, drug content, and saturation solubility. The fo
... Show MoreBackground. To identify the most common retention protocols practiced by Iraqi orthodontists using a specially designed e-survey. Furthermore, this study aimed to assess the effect of sociodemographic factors on the participant’s choice. Methods. Two hundred and twenty-five questionnaires with 23 multiple choice questions were sent to members of the Iraqi Orthodontic Society. The questionnaire was organized into four sections representing information about sociodemographic status of the orthodontists, factors affecting the selection of the retention system, commonly used retainers in the upper arch and lower arch, and duration of the retention system. The chi-square test was used to test the significant association between differe
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreThe aim of present study was to develop gel formulation of microsponges of poorly soluble drug meloxicam (MLX) in order to enhance the release and dissolution of MLX which is the limitation for preparation in topical forms. Also skin delivery is an alternative administration for MLX that can minimize gastrointestinal (GI) side effects and improve patient compliance. The microsponges of MLX were prepared by quasi-emulsion solvent diffusion method. The effects of drug:polymer ratio, stirring time and Eudragit polymer type on the physical characteristics of microsponges were investigated and characterized for production yield, loading efficiency, particle size, surface morphology, and in vitro drug release from microsponges. The selec
... Show MoreSmart systems are the trend for modern organizations and should meet the quality of services that expect to produce. Internet of Everything (IoE) helped smart systems to adopt microcontrollers for improving the performance. Analyzing and controlling data in such a system are critical issues. In this study, a survey of IoE systems conducted to show how to apply a suitable model that meets such system requirements. The analysis of some microcontroller boards is explored based on known features. Factors for applying IoE devices have been defined such as connectivity, power consumption, compatibility, and cost. Different methods have been explained as an overview of applying IoE systems. Further, different approaches for applying IoE technology
... Show MoreThe new Schiff base 1‐[(2‐{1‐[(dicyclohexylamino)‐methyl]‐1H‐indol‐3‐yl}‐ethylimino)‐methyl]naphthalen‐2‐ol (HL) was prepared from 1‐{[2‐(1H‐Indol‐3‐yl)‐ethylimino] methyl}‐naphthalen‐2‐ol and dicyclohexyl amine. From this Schiff base, monomeric complexes [M (L)n (H2O)2 Cl2] with M = Cr, Fe, Mn, Cd, and Hg were synthesized and characterized based on elemental analysis (EA), FT‐IR, mass(MS), UV‐visible, thermal analysis, magnetic moment, and molar conductance. The results showed that the geometrical structural were octahedral geometries for the Cr(III) and Fe(III) complex
The present work is to investigate the feasibility of removal vanadium (V) and nickel (Ni) from Iraqi heavy gas oil using activated bentonite. Different operating parameters such as the degree of bentonite activation, activated bentonite loading, and operating time was investigated on the effect of heavy metal removal efficiency. Experimental results of adsorption test show that Langmuir isotherm predicts well the experimental data and the maximum bentonite uptake of vanadium was 30 mg/g. The bentonite activated with 50 wt% H2SO4 shows a (75%) removal for both Ni and V. Results indicated that within approximately 5 hrs, the vanadium removal efficiencies were 33, 45, and 60% at vanadium loadings of 1
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreIn terms of the core nucleus plus valence nucleon, shell-model calculations using two model spaces and interactions, the relationship between a nucleus' proton skin, and the difference in proton radii of mirror pairs of nuclei with the same mass number are investigated. In this work, two pairs of mirror nuclei will be studied: 17Ne-17N and 23Al-23Ne. For 17Ne-17N nuclei, p-shell and mixing of psd orbits are adopted with Cohen-Kurath (ckii) and psdsu3 interactions. While for 23Al-23Ne, the sd-shell and sdpf shell are adopted with the universal shell model (USD) and sdpfwa interactions. Also, the ground state density distributions, elastic form factors, and root mean square radii of these pairs' nuclei are studied and com
... Show More