Background: The highest concentrations of
blood glucose during the day are usually found
postprandialy. Postprandial hyperglycemia (PPH)
is likely to promote or aggravate fasting
hyperglycemia. Evidence in recent years suggests
that PPH may play an important role in functional
& structural disturbances in different body organs
particularly the cardiovascular system.
Objective: To evaluate the effect of (PPH) as a
risk factor for coronary Heart disease in Type 2
diabetic patients.
Methods: Sixty-three type2 diabetic patients
were included in this study. All have controlled
fasting blood glucose, with HbA1c correlation.
They were all followed for five months period
(from May to October 2008). A two hour
postprandial glucose (PPG) was done for all. Other
risk factors were taken in consideration such as
hypertension, obesity, and dyslipidemia. The study
was performed on those patients after at least three
months of controlled fasting blood glucose. ECG
was done to all of them.
Results : Out of the 63 type 2 diabetic patients,
20 had normal PPG and HbA1c levels, one of them
(5%), has ischemic changes on ECG twenty
patients had normal HbA1c & High PPG with 7
(35%) of them showed ischemic changes on ECG
17 patients showed a high PPG and a high HbA1c
with four of them showed ischemic changes on
ECG P<0.05. The remaining 6 patients had normal
PPG but high HbA1c & also only one of them
showed ischemic changes on ECG.
Conclusion This study showed that PPH is a
significant risk factor for ischemic heart disease
(IHD).
The research aims to measure the sustainability of the Iraqi economy for the period 1990-2018 as well as to show the impact of fluctuations in the level of GDP on financial sustainability, where financial sustainability is the necessary and sufficient condition for achieving economic and financial balance in the country, as financial sustainability reflects the movement of the state budget and its relationship to GDP through the indicators of deficit, fiscal surplus and public debt internal and external, as well as reflecting the art of managing public debt, and the more managed public debt is achieved, the more the management of public debt is achieved financial sustainability. for the state in the sense that there is a reciprocal
... Show MoreObjective: The study aims to assess the knowledge and practices of mothers with hemophilia children type - A - ,
socio-economic status and association between mother demographic information with their knowledge and practices
toward their children in Azadi Teaching Hospital in Kirkuk.
Methodology: Descriptive study no probability (purposive) sample. Selected Fifty-five of mothers having hemophilia
children, started from November 2012 to May 2013. Study was carried out in the Azadi teaching hospital in
Kirkuk. By using questionnaire which consists from five parts include demographic characteristics for mother and
children, socio-economic, Knowledge and practices data gathered, by direct interview with the mothers in the
The blade pitch angle (BPA) controller is key factor to improve the power generation of wind turbine (WT). Due to the aerodynamic structural behavior of the rotor blades, wind turbine system performance is influenced by pitch angle and environmental conditions such as wind speed, which fluctuate throughout the day. Therefore, to overcome the pitch angle control (PAC) problem, high wind speed conditions, and due to type-1 and type-2 fuzzy logic limitations for handling high levels of uncertainty, the newly proposed optimal hybrid type-3 fuzzy logic controller has been applied and compared since type-3 fuzzy controllers utilize three-dimensional membership functions, unlike type-2 and type-1 fuzzy logic controllers. In this paper six differen
... Show MoreAW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreThe aim of the current research is to construct a scale of emotional adjustment for kindergarten children and to set a standard for its evaluation. To achieve this, a scale consisting of (19) items was prepared. The mother of the child answered by adopting the method of self-report, which is expressed in the form of reporting terms, as each item represents a situation in the child's life and each situation has three alternatives to answer that represent various responses to the mentioned situation. One of the alternatives represents the emotionally adaptive response, which is given a degree (3), the second response expresses the emotional adjustment partly that took the degree of (2), and the third response expresses the weakness of emot
... Show MoreMaximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty
... Show MoreBackground: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date. Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magneti
... Show More