Background: Many structural or functional abnormalities can impair the production of thyroid hormones and cause hypothyroidism.Objectives: to identify the main etiological causes of hypothyroidism among patients visiting Specialized Center for Diabetes and Endocrinology.Methods: This study was conducted in the Specialized Center for Diabetes and Endocrinology on 217 patients with proved hypothyroidism, from 2006 to 2008. Every patient was tested with thyroid function tests, Ultrasound examination, thyroid autoantibodies, fine needle aspiration, radiology of skull, isotopes scan, also checking adrenal and gonadal function. Results: Out of these 217 patients 120 patients have thyroiditis 33 patients had been undergone thyroidectomy. 39 patients had received radioactive iodine, 19 patients had congenital causes. One patient had Pituitary cause, 5 patients had graves diseases.Conclusions: It was found that the common causes of hypothyroidism are either chronic autoimmune thyroiditis or destructive treatment for thyrotoxicosis. The results of this study suggest an increase in autoimmune thyroid disease similar to the rising prevalence of type1 DM possibly indicating a rising incidence of autoimmunity in young people
This research aims to suggest formulas to estimate carry-over effects with two-period change-over design, and then, all other effects in the analysis of variance of this design, and find the efficiency of the two-period change-over design relative to another design (say, completely randomized design).
In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we
... Show MorePublic private partnership PPP is a method to procure public projects in order to achieve additional value for money in terms of efficiency and quality of services. This thesis studies the concepts of PPP, advantages and disadvantages of PPP. In addition, current Iraq infrastructure projects situations and needs, as well as, some aspects relating to the Iraq’s construction market, legal and contract systems were discussed. A financial model was carried out and applied to a real-life case study project. Finally, a survey targeted researchers; public and private- sectors were applied.
This article discusses the estimation methods for parameters of a generalized inverted exponential distribution with different estimation methods by using Progressive type-I interval censored data. In addition to conventional maximum likelihood estimation, the mid-point method, probability plot method and method of moments are suggested for parameter estimation. To get maximum likelihood estimates, we utilize the Newton-Raphson, expectation -maximization and stochastic expectation-maximization methods. Furthermore, the approximate confidence intervals for the parameters are obtained via the inverse of the observed information matrix. The Monte Carlo simulations are used to introduce numerical comparisons of the proposed estimators. In ad
... Show MoreIn this article, we introduce and study two new families of analytic functions by using strong differential subordinations and superordinations associated with Wanas differential operator/. We also give and establish some important properties of these families.
The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show More