Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreOne of the most common metabolic illnesses in the world is diabetes mellitus. This metabolic disease is responsible for a large percentage of the burden of kidney damage and dysfunction. The goal of this study was to look into the renal function of diabetic patients using metformin monotherapy who came to Mosul's Al-Wafaa diabetes care and research facility. During the period 1 January 2021 to 30 April 2021, 47 patients with T2DM (age 50.48 7.74 years) were enrolled in this case-control study. These patients' results were compared to a control group of 47 seemingly healthy people (age 45.89 9.06 years). All participants' demographic and medical histories were acquired through the delivery of a questionnaire. Blood samples were collected
... Show MoreThe aim of this study was spot light to the possibility of confection between hepatitis C&G viruses in Iraqi patients. The groups was studied included two groups as follow: 1- first group: its (Infected group) the patients of this group have Anti-HCV abs in their serum by using Indirect ELISA technique. 2- second group: its (Control group) the persons of this group have no Anti-HCV abs in their serum by using indirect ELISA technique. The result of this study was observed there was two patients from the first group have Anti-HGVabs in their serum with infection percent 2.70%, also the same result was found in the second group wich mean there was two persons have Anti-HGVabs in their serum with infection percent 8.33% .So when we comparin
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreBackground: This study aimed to find whether there is a relation between the mesio-distal crown diameters of the deciduous second molars and the permanent first molars in an Iraqi sample from Baghdad city. Material and methods: The sample consisted of 54 Iraqi children aged 8-9 years at the mixed dentition stage. The measurements included the mesio-distal crown width of the deciduous second molars and the permanent first molars on the study casts using digital sliding vernier. Results: The results revealed absence of the side difference of the widths of teeth measured. High significant gender difference was detected for the permanent first molars and the deciduous second molars except mandibular permanent first molar. On the other hand, hig
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
In this study, vegetable tanned leather waste of cow (VTLW-C) is used as adsorbent for removing methyl violet 10B dye from aqueous solution. The VTLW-C adsorbent was characterized by FTIR and SEM in order to evaluate its surface properties before using in adsorption experiments. Batch adsorption method was applied to study the effect of different factors such as weight of leather waste, time of shaking, and starting concentration of methyl violet 10B dye. Different isothermal models such as Langmuir, Freundlich, Temkin and Dubinin-Radushkevich (D–R) were used to analyze the experimental data. Kinetic study proceeds using (PFO) kinetic model and (PSO) kinetic model. The results showed better agreement with the Freundlich model; this means
... Show MoreOur research is related to the projective line over the finite field, in this paper, the main purpose is to classify the sets of size K on the projective line PG (1,31), where K = 3,…,7 the number of inequivalent K-set with stabilizer group by using the GAP Program is computed.
In This paper generalized spline method and Caputo differential operator is applied to solve linear fractional integro-differential equations of the second kind. Comparison of the applied method with exact solutions reveals that the method is tremendously effective.