Background: Osteoporosis is a frequent disease that is manifested by reduced in mineral density and raised in fracture risk. Recent studies have indicated that osteoporosis is caused by composite connections among local and systemic regulators of bone cell function.
Objective: The purpose of this study was to investigate the relationship between interleukin-2, interleukin-4, and some biochemical markers in Iraqi patients with osteoporosis.
Patients and Methods: Forty five osteoporotic patients were incorporated in this study (30 women and 15 men). Serum fasting glucose, lipid profile, alkaline phosphatase activity, calcium, magnesium, interleukin-2, and interleukin-4 were measured in osteoporotic patients and compared them with the control group.
Results: There was a significant increase in serum fasting glucose, lipid profile except high density lipoprotein cholesterol, and serum alkaline phosphatase activity in osteoporotic patients as compared to the control, (P=0.001). Also, there was a significant increase in interleukin-2 and interleukin-4 in osteoporotic patients as compared to the control, (P= 0.01). While there was a decrease in serum calcium and magnesium levels in osteoporotic patients as compared to the control. Also, there was a significant positive correlation between serum alkaline phosphatase activity with interleukin-2 and interleukin-4 levels in osteoporotic patients, (P= 0.01).
Conclusion: Elevated levels of interleukin-2 and interleukin-4 along with some biochemical markers like; serum alkaline phosphatase in osteoporotic patients might include significant functions in the pathogenesis of osteoporosis.
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
In this work, we consider a modification of the Lotka-Volterra food chain model of three species, each of them is growing logistically. We found that the model has eight equilibrium points, four of them always exist, while the rest exist under certain conditions. In terms of stability, we found that the system has five unstable equilibrium points, while the rest points are locally asymptotically stable under certain satisfying conditions. Finally, we provide an example to support the theoretical results.
The present work is concerned with the investigation of the behavior and ultimate capacity of axially loaded reinforced concrete columns in presence of transverse openings under axial load plus uniaxial bending. The experimental program includes testing of twenty reinforced concrete columns (150 × 150 × 700 mm) under concentric and eccentric load. Parameters considered include opening size, load eccentricity and influence of the direction of load eccentricity with respect to the longitudinal axis of the opening. Experimental results are discussed based on load – lateral mid height deflection curves, load – longitudinal shortening behavior, ultimate load and failure modes. It is found that when the direction of load
... Show MoreIn this paper, we study, in details the derivation of the variational formulation corresponding to functional with deviating arguments corresponding to movable boundaries. Natural or transversility conditions are also derived, as well as, the Eulers equation. Example has been taken to explain how to apply natural boundary conditions to find extremal of this functional.
Many fuzzy clustering are based on within-cluster scatter with a compactness measure , but in this paper explaining new fuzzy clustering method which depend on within-cluster scatter with a compactness measure and between-cluster scatter with a separation measure called the fuzzy compactness and separation (FCS). The fuzzy linear discriminant analysis (FLDA) based on within-cluster scatter matrix and between-cluster scatter matrix . Then two fuzzy scattering matrices in the objective function assure the compactness between data elements and cluster centers .To test the optimal number of clusters using validation clustering method is discuss .After that an illustrate example are applied.
Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR
This paper is concerned with the oscillation of all solutions of the n-th order delay differential equation . The necessary and sufficient conditions for oscillatory solutions are obtained and other conditions for nonoscillatory solution to converge to zero are established.
Summary:
OBJECTIVE Many associations have been found between specific HLA antigens and increased susceptibility to various diseases . So we tried to associate class I and class II antigens with acute lymphoblastic leukemia . We also demonstrate the presence of antibodies in serum of acute lymphoblastic leukemic patients against HLA class I.
DESIGN: Prospective study.
SETTING: Tissue typing and histocompatibility center at Al- Karamah Teaching Hospital. PATIENTS AND METHOD: 70 acute lymphoblastic leukemia patients from pediatric hospitals. HLA ( human leukocyte antigens) typing done for them by serological method and cross matching and blood grouping were also done for them.
RESULTS: there was significant difference between pa
Android OS is developing very fast, and because of being an open source OS, it is vulnerable to many problems that are manifested to users directly or indirectly. Poor application launch time is one of these problems. In this paper, a set of sixteen experiments is established to distinguish the factors that have the most evident effects on application launch time in Android mobiles. These factors are application, launch and kill, events, and storage. Mann Kendall (MK) test, one way analysis of variance (ANOVA), and Design of Experiment (DOE) are used to prove the influence of factors statistically. As a result of the experiments, the application factor, especially the third party applications level, has the most prominent effects on appl
... Show MoreIn this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.