Background: The highest concentrations of
blood glucose during the day are usually found
postprandialy. Postprandial hyperglycemia (PPH)
is likely to promote or aggravate fasting
hyperglycemia. Evidence in recent years suggests
that PPH may play an important role in functional
& structural disturbances in different body organs
particularly the cardiovascular system.
Objective: To evaluate the effect of (PPH) as a
risk factor for coronary Heart disease in Type 2
diabetic patients.
Methods: Sixty-three type2 diabetic patients
were included in this study. All have controlled
fasting blood glucose, with HbA1c correlation.
They were all followed for five months period
(from May to October 2008). A two hour
postprandial glucose (PPG) was done for all. Other
risk factors were taken in consideration such as
hypertension, obesity, and dyslipidemia. The study
was performed on those patients after at least three
months of controlled fasting blood glucose. ECG
was done to all of them.
Results : Out of the 63 type 2 diabetic patients,
20 had normal PPG and HbA1c levels, one of them
(5%), has ischemic changes on ECG twenty
patients had normal HbA1c & High PPG with 7
(35%) of them showed ischemic changes on ECG
17 patients showed a high PPG and a high HbA1c
with four of them showed ischemic changes on
ECG P<0.05. The remaining 6 patients had normal
PPG but high HbA1c & also only one of them
showed ischemic changes on ECG.
Conclusion This study showed that PPH is a
significant risk factor for ischemic heart disease
(IHD).
Background: Pelvic masses are common in women & can present at any age of woman life, it could be benign or malignant mass and may originate from gynecological organs like cervix, uterus, uterine adnexia, or from other pelvic organs like intestine, bladder, ureters, skeletal muscle, and bone.Objective: We attempted to determine the increasing of platelet counts(> 450.000 /micro liter) and CA125serum level (> 35 U/mL) as useful tools for predicting and confirming malignancy in gynecological pelvic mass.Patients and methods: A prospective unmatched hospital based case-control study carried out at Baghdad Teaching Hospital, about 126 women were enrolled in our study, divided into two groups 60 women were control group (free o
... Show MoreThe aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached seve
... Show MoreFive species of Lactic acid bacteriawere isolated from raw milk, yoghurt, vegetables and pickles, Lactobacillus plantarum, Lactobacillus acidophilus, Lactobacillus brevis, Lactobacillus casei and Lactobacillus bulgaricus isolates were identified by 16S rRNA gene. Evaluate of antimicrobial activity against all the bacterial strains Staphylococcus aureus, Salmonella spp., Pseudomonas fluorescens, Escherichia coli, Bacillus cereus and Bacillus subtilis. It showed that bacteriocin of Lactic acid bacteriamore effective than supernatant of lactic acid bacteria, the results showed that isolatemost efficient isolate belonging to Lactobacillus brevis, the diameter of the inhibition of the bacteriocin of Lactobacillus brevis were 27.7, 26.3 and 25.1
... Show MoreThe influence of Cr3+ doping on the ground state properties of SrTiO3 perovskite was evaluated using GGA-PBE approximation. Computational modeling results infered an agreement with the previously published literature. The modification of electronic structure and optical properties due to Cr3+ introducing into SrTiO3 were investigated. Structural parameters assumed that Cr3+ doping alters the electronic structures of SrTiO3 by shifting the conduction band through lower energies for the Sr and Ti sites. Besides, results showed that the band gap was reduced by approximately 50% when presenting one Cr3+ atom into the SrTiO3 system and particularly positioned at Sr sites. Interestingly, substituting Ti site by Cr3+ led to eliminating the band ga
... Show MoreAbstract: The development of highly sensitive sensors has become an efficient field of research. In this work, an ArF Excimer laser of 193 nm with a maximum pulse energy of 275 mJ, 15 ns pulse duration and a repetition rate of 1 Hz is utilized to form a Laser Induced Periodic Surface Structures (LIPSS) of three different morphologies (nanochains, contours, grooves) on surface of CR39 polymer at a fluence range above the ablation threshold (250 mJ/cm2). The laser ablated polymer surface is then Surface Enhanced Raman Scattering (SERS) activated by deposition of a gold layer of 30 nm thickness. The capability of the produced substrate for surface enhanced Raman scattering is evaluated through thiophenol as an analyte molecule. It is observ
... Show MoreIn the present study, a low cost adsorbent is developed from the naturally available sawdust
which is biodegradable. The removal capacity of chromium(VI) from the synthetically prepared
industrial effluent of electroplating and tannery industrial is obtained.
Two modes of operation are used, batch mode and fixed bed mode. In batch experiment the
effect of Sawdust dose (4- 24g/L) with constant initial chromium(VI) concentration of 50 mg/L and
constant particle size less than1.8 mm were studied.
Batch kinetics experiments showed that the adsorption rate of chromium(VI) ion by Sawdust
was rapid and reached equilibrium within 120 min. The three models (Freundlich, Langmuir and
Freundlich-Langmuir) were fitted to exper
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreThe purpose of this study was to develop poloxamer-based in-situ gel of chloramphenicol aiming to increase bioavailability and prolong corneal contact time, controlling drug release, and enhancing ocular bioavailability. The in-situ gel was prepared using different concentrations of poloxamer 407 combined with hydroxypropyl methyl cellulose (HPMC) or carbapol 940 to achieve gelation temperature about physiological temperature and improve rheological behavior and gelling properties of poloxamer gel. The prepared formulations were evaluated for their appearance, pH, and sol-gel transition temperature. The formulations F2, F3, and F5 have a gelation temperature within the accepted range 35-370C an
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.