Background: Arterial stiffness is related with atherosclerosis and cardiovascular disease events. Patients with atherosclerotic disease show to have larger diameters, reduced arterial compliance and lower flow velocities. Aim of study : To compare between patients of two age groups with concomitant diseases diabetes and hypertension in regard to intima media thickness and blood flow characteristics in order to estimate the blood perfusion to the brain via the common and internal carotid arteries. Subject and Methods : 40 patients with (diabetic and hypertension) diseases were enrolled , they were classified according to age. Color Doppler and B mode ultrasound was used to determine lumen Diameter (D), Intima – media thickness (IMT), end diastolic velocity (EDV), peak systolic velocity (PSV), Resistive Index (RI), Pulsatility Index (PI), and the flow rate indices were calibrated and calculated . Results:- Results show that the change in the lumen diameter between the old patients group and the younger group were (2.02%) with insignificant (p value >0.05), and the difference in the in intima-media (IMT) thickness between the two age groups (35- 55) and (56-75) are (33.8%) with significant (p value <0.05). The change difference in peak systolic velocity was (-13.29% ) with insignificant (p value >0.05), while the difference in the (EDV) between both age groups was (-38.02%), with significant p value <0.05. Pressure gradient and flow rate have given insignificant difference between both age groups. Conclusion: The intima media is significantly thicker for the old age group than in the younger group. The increased thickness of intima media did not influence the lumen diameter significantly. A clear change in PSV, EDV, RI, and PI was observed which have influenced blood perfusion to the brain.
Objective: To evaluate biomarkers of insulin resistance and acute phase reactants in obese, overweight and lean subjects and investigate the associations among those biomarkers. Methodology: This cross sectional study included 158 subjects who were stratified into three groups. Group1 comprised 53 obese patients (BMI≥ 30 kg/m2); group 2 were 54 overweight subjects, and group 3 had 51 healthy lean (BMI
In the rapidly evolving telecommunications industry, accurate valuation of tangible assets remains a critical challenge that requires adherence to universally recognized standards. This study addresses the pressing need for transparent and precise asset valuation methodologies that are pivotal for informed investment decisions and financial reporting. It aims to bridge the theoretical and practical divide in asset valuation by applying International Valuation Standards (IVS) 300 and 400 to Asiacell Communications PJSC, a leading entity in the sector. Focusing on five key tangible assets from 2018 to 2022 – lands, buildings, plant and equipment, means of transport and transfer, and furniture and office equipment – the study emplo
... Show MoreThrough this research, We have tried to evaluate the health programs and their effectiveness in improving the health situation through a study of the health institutions reality in Baghdad to identify the main reasons that affect the increase in maternal mortality by using two regression models, "Poisson's Regression Model" and "Hierarchical Poisson's Regression Model". And the study of that indicator (deaths) was through a comparison between the estimation methods of the used models. The "Maximum Likelihood" method was used to estimate the "Poisson's Regression Model"; whereas the "Full Maximum Likelihood" method were used for the "Hierarchical Poisson's Regression Model
... Show MoreImage compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show MoreIt is more beneficial science and created and the highest honor is the Koran Sciences, God has honored research in this fun science, came this research that shed the light on the radical incision, and Naughty derivatives as contained in the Koran, and illustrate the diversity of Saghma morphological, and fork them from derivatives what it entailed connotations, as well as the evacuation of cryptic in some of these verses from the biological secrets take minds newly exposed Anitrjt science under the name of scientific miracles.
The research methodology is revenue verse which included the word, and revenue lexical meaning and its meaning in the context of the Qur'an, and reflect the views of the commentators of the verse, and then the r
This study deals with the reality of the design of a washing machine automation available in the markets Mahlah.otata importance of this issue is through the development of technological and technical exploited for the benefit of the consumer and always seeking perfection in industrial product through providing comfort to the user and reduce fatigue and the effort and time-saving as well. On this basis, the research aims of this study put the foundations for the development of design automation washer. The boundaries of the study were products company LG producing Sna2012.uahtot this study on five chapters included Allvsal first importance of research and the need for a mechanism in addition to Alchuklh research objectives and Hdodh.ama
... Show MoreThe research entitled "The political changes and economic developments in contemporary Turkish Backgrounds, manifestations and future possibilities" consists of the introduction, four sections and conclusions. The background details, its developments, and the transformation in the economic sector in Turkey were reviewed. The first section concentrated on the brief introduction about the political developments which happened since the independence of Turkey at 1923 with the highlight on the years after the receipt of the Freedom and Justice Party (Ak PARTi) the Turkish Government rule. The second section demonstrated the reality of Turkish economy before 2002, while the
... Show MoreThis research sheds light on the use of metal in the manufacture of jewelry, which is represented by ornamental tools in the period between the third and second millennium BC, in addition to the most important molds used in their manufacture. Man has been interested in metals since early ages, and was able to make tools that he uses in his daily life, especially jewelry. And the Syrian people got acquainted with the types of minerals, their characteristics, and how to deal with them. Minerals played an effective and prominent role in the economy of ancient Syria. Trade with those countries and secure their roads.
One of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.
The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.
For data compression, where one is trying to find compact transform representations for a
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show More