Diabetic retinopathy is one of most important complications of diabetes mellitus that can be treated by Nd:YAG laser. Laser is used in ophthalmic practice for photocoagulation and photodisruption. The purpose of this study is to evaluate changes in immunological ,hematological and biochemical values after treatment of diabetic retinopathy by laser. Blood samples from 10 patients suffering from diabetic retinopathy were taken before and after laser treatment to coagulate retina to prevent leakage and hemorraghe to avoid deterioration of vision.In group one (4 patients = 40%), blood tests were done one day after treatment. In group two (6 patients =60%) tests were done 7 days after treatment with laser. The study showed no clear changes in the values of biochemical tests(except glucouse is already high) and hemtologyical tests (except PT, PTT, clotting time and bleeding time for those patients taking l00mg acetylsalicylic acid or warfarin) after irradiation with laser, probably because that main organs that affecting these tests or the elements that involve in these tests have not been irradiated directly. The main changes were in mmunoglobulin values which increased as noticed in both groups, because all light- induced biological effects depend on the parameters of irradiation, the results suggest that the laser irradiation may play two principal roles in immunological changes. First, is stimulation of cellular proliferation, and stimulation of cellular differentiation that is responsible for different types of immunoglobulin.The other suggestion is that laser is acting as a triggering factor which induces systematic effects through the circulation when laser interacts with living cells so it has systemic effects through circulating blood.
Inform the people of the Enlightenment including what was said in detail
In photography
For Mohammed Hashim bin Ahmed footy famous Balva Hashim (Tel: 1349 e)
The research deals with analyzing the influencing role of trade policies in the growth and development of productive economic sectors and their contribution to GDP and its reflection on workforce employment. Studies have proven the success of the Malaysian experience in stimulating the productive economic sectors to grow and their contribution to the gross domestic product with an increase in the growth of local markets and access to international markets for national products. The research also deals with the ineffectiveness of Iraqi trade policies after 2003 in stimulating the productive economic sectors (agricultural and industrial) on economic growth, as most of the increase in Iraqi GDP growth throughout the study period was
... Show MoreGingival crevicular fluid (GCF) may reflect the events associated with orthodontic tooth movement. Attempts have been conducted to identify biomarkers reflecting optimum orthodontic force, unwanted sequallea (i.e. root resorption) and accelerated tooth movement. The aim of the present study is to find out a standardized GCF collection, storage and total protein extraction method from apparently healthy gingival sites with orthodontics that is compatible with further high-throughput proteomics. Eighteen patients who required extractions of both maxillary first premolars were recruited in this study. These teeth were randomly assigned to either heavy (225g) or light force (25g), and their site specific GCF was collected at baseline and aft
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show MoreAt a time when the general rules in the different legal systems require the presence of two parties to the contract, one of which is issued the first expression of the will and is called the offer, and the other is issued from the other and is called the acceptance. A special type of contracts emerged in the beginning of the last century called the “unilateral contracts”. The side sparked a major jurisprudential dispute, as well as the issuance of several contradictory judicial rulings on it. Hence, this research came to highlight this special type of contract. Key words: the definition of a unilateral contract, its distinction from other legal situations, and its effects.
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show Morehe current research aims at showing the correlation and effect of the internal environment analysis in the quality of health service in AL_Elwiya Maternity Teaching Hospital, researcher depended on the integral method in the "analytical descriptive method" for the study of the relation between the main variables and the sub-variables throughout data collection required by the theme of this study, a case study" in tackling the data and information related to the financial aspects of the internal environment.
The problem of the study was manifested in the essential question, that is (is there internal struc
... Show MoreThe research tried to show the importance of Administrative Control being one of the important means in administrative work; they work on the review and audit work done and error handling explored in the work and prevent the occurrence and ascertain the extent of implementation of the planned targets, and therefore this is reflected in raising the efficiency of the performance of the tax examiner and complete the work as soon as possible and the highest efficiency and reduce the gaps that may occur between the parties of the tax settling accounts and dealt with in the theoretical side of the search to the research problem, namely with whether operating management oversight to improve the performance and increase the efficiency of t
... Show MoreThis research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to