Introduction: The association between acute stroke and
renal function is well known. The aim of this study is to
know which group of patients with acute stroke is more
likely to have undiagnosed Chronic Kidney Disease and
which risk factors are more likely to be associated with.
Methods:We studied 77 patients who were diagnosed to
have an acute stroke.Patients were selected between
April2011andJune 2011 using the " 4-variable
Modification of
Diet in Renal Disease Formula " which estimates
Glomerular Filtration Rate using four variables :serum
creatinine ,age ,race and gender.
Results :The study included 38 male and 39 females
patients ,aged (35-95) years. Glomerular Filtration Rate in
patients with acute stroke was calculated and showed
37.6% , 28.5% , 25.6% , 6.4% and 2.5% (Chronic Kidney
Disease stage 0, 1,2,3,4,5 respectively.)
Conclusion :One Third of patients with acute stroke had
Glomerular Filtration Rate less than 60ml/min per 1.73m²
patients who had more than 2 risk factors of Chronic
Kidney Disease are about 3 times more likely to have
Glomerular Filtration Rate less than 60 ml/min per
1.73m² to those with 2 or less risk factors
This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis
AO Dr. Ali Jihad, Journal of Physical Education, 2021
In light of today's business world, who faces challenges and intense competition as a result of the rapid evolution of technical and informational, organizations had to respond to variables through the adoption of modern management techniques that reduce the effects of risks and activating the role of the internal control system in order to contribute to the early detection of risks and reduce the negative results expected .The research is to address the problem faced by organizations which still follow the traditional methods in the control activities, and the lack of knowledge of the management and their staff of the importance of the existence of risk management and internal control system takes into account these risks, and the limit
... Show MoreThis paper is employed to discuss the effects of the magnetic field and heat transfer on the peristaltic flow of Rabinowitsch fluid through a porous medium in the cilia channel. The governing equations (mass, motion, and energy) are formulated and then the assumptions of long wavelength and low Reynold number are used for simplification. The velocity field, pressure gradient, temperature, and streamlines are obtained when the perturbation technique is applied to solve the nonlinear partial differential equations. The study shows that the velocity is decreased with increasing Hartmann number while it is decreased with increasing the porosity.
Densely deployment of sensors is generally employed in wireless sensor networks (WSNs) to ensure energy-efficient covering of a target area. Many sensors scheduling techniques have been recently proposed for designing such energy-efficient WSNs. Sensors scheduling has been modeled, in the literature, as a generalization of minimum set covering problem (MSCP) problem. MSCP is a well-known NP-hard optimization problem used to model a large range of problems arising from scheduling, manufacturing, service planning, information retrieval, etc. In this paper, the MSCP is modeled to design an energy-efficient wireless sensor networks (WSNs) that can reliably cover a target area. Unlike other attempts in the literature, which consider only a si
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show More