Background:The most common pattern of dyslipidemia in diabetic patients is increased triglyceride (TG) and decreased HDL cholesterol level, The concentration of LDL cholesterol in diabetic patients is usually not significantly different from non diabetic individuals, Diabetic patients may have elevated levels of non-HDL cholesterol [ LDL+VLDL]. However type 2 diabetic patients typically have apreponderance of smaller ,denser LDL particles which possibly increases atherogenicity even if the absolute concentration of LDL cholesterol is not significantly increased. The Third Adult Treatment Panel of the National Cholesterol Education Program (NCEP III) and the American Heart Association (AHA ) have designate diabetes as a coronary heart disease (CHD) equivalent and recommended treatment of LDL-c to < 2.6 mmoll (<100 mgldl)Objectives: We assessed the treatment ,type and control of dyslipidemia among adults with diabetes mellitus.Methods:This is a prospective study conducted in the Neurosurgical Hospital in Baghdad, Iraq, during the period from January 1999 to January 2001. Any patient admitted during the period of the study with clinical history, signs, symptoms, and contrast enhanced MRI suggesting a cerebral glioma and confirmed by postoperative histopathological results of glioma has been included in this study. While multifocal lesions, long-lasting epilepsy, use of antiepileptic therapy, multiple cranial lesions, previous cranial surgery, any chronic illness, and histopathological result of other tumors were exclusion criteria. All patients were at their first operation for brain tumors. Patients were examined by analyzing several functional domains (intelligence, executive functions, memory, language, praxis, gnosis and mood state) in order to establish the effect of tumor and surgery on cognition.Results:29 patients who fulfilled the selection criteria were included. Mean duration of clinical history was 5 months (range 1–9 months). At baseline, using test- and domain-based criteria, 79% and 38% of patients, respectively, were impaired, the former related to tumor factors such as edema (P <0.05), larger size (P <0.05) and higher grade (P = 0.001). Verbal memory, visuospatial memory and word fluency were the most frequently affected functions, partly associated with depression. Postoperatively, 38% and 55% of patients, respectively, were unchanged, 24% and 21% improved, and 38% and 24% worsened; 24% and 62% of patients were intact, respec¬tively.Conclusions:The extent of removal did not influence the outcome. Improvement involved previously impaired functions and was correlated with high-grade tumors. Worsening regar-ded executive functions was related to tumor size and was partly explained by radiological findings on postoperative MRI. This prospective study, focusing on the effects of tumor and surgery, showed that tumor significantly affects cognitive func¬tions, mainly due to the mass effect and higher grading. Surgical treatment improved the functions most frequently affected preoperatively and caused worsening of execu¬tive functions soon after operation, leaving the overall cognitive burden unchanged and capable of improvement prospectively
The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi
This research has been applied on 100 children (age 4 – 6 years) from three kindergartens distributed on basis of 43 children from the college of Education for women kindergarten (A) , 27 children from the governmental Al- Mustafa kindergarten (B) , and 30 children from the private Al – Baraom kindergarten (C) . Details concerning their school meals, already prepared at home , have been analyzed according to their dietary components taken from the tables of the dietary values .The statistical analysis results have shown no significant difference (p< 0.01) in the intake of energy , protein and thiamin between the children of A and C kindergartens while these children have significantly recieved higher amounts of the above nutrien
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of
... Show MoreHere we present the results of experiments involving cynomolgus macaques, in which a model of traumatic spinal cord injury (TSCI) was created by using a balloon catheter inserted into the epidural space. Prior to the creation of the lesion, we inserted an EMG recording device to facilitate measurement of tail movement and muscle activity before and after TSCI. This model is unique in that the impairment is limited to the tail: the subjects do not experience limb weakness, bladder impairment, or bowel dysfunction. In addition, 4 of the 6 subjects received a combination treatment comprising thyrotropin releasing hormone, selenium, and vitamin E after induction of experimental TSCI. The subjects tolerated the implantation of the recording devi
... Show MoreThe life insurance companies need a sound system to use it in selecting Insurable risks so they can avoid or reduce possible losses that may be insured to a minimum levels , But the application within IRAQI INSURANCE COMPANY reflects that it still depends on a traditional ways in the procedures used to select that risks .
This research represents an attempt to put acceptable suggestions about developing a system for selecting insurable risks which used now by iraqi insurance company by recognizing the risks of life insurance , determining kinds of risks which can difined as normal and upnormal risks , rectification of the
... Show MoreAs cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More