Background: Dyslipidemia is a major cause of
cardiovascular disease, which in turn, is the most
common cause of female morbidity and mortality.
Postmenopausal women (natural and surgical) are at
higher risk of developing cardiovascular disease,
especially coronary artery atherosclerosis.
Objective: To observe the relationship between blood
lipids: total cholesterol (TC), high density lipoproteincholesterol (HDL-C), low density lipoproteincholesterol (LDL-C), triglycerides (TGs), and very low
density lipoprotein- cholesterol (VLDL-C), LDL-C/
HDL-C ratio (atherogenic index) and menopausal
status, and to determine the co-factors that may explain
this relationship
Methods: A prospective, cross-sectional study, which
includes 279 women, age range from 35-55 years
agreed to participate in this study. They were divided
into 4 groups according to their menopausal status.
These were pre-, peri post- natural and surgical postmenopausal. Data were collected from participants in a
pre-coded questionnaire and an overnight fasting blood
sample was collected for biochemical analysis.
Results: Postmenopausal women had higher levels of
lipids than pre or peri-menopausal. TC concentration
and LDL-cholesterol levels were higher in natural and
surgical menopause than in pre and pri-menopausal
women (p<0.01 and p<0.05 respectively). While
LDL/HDL-C ratio (atherogenic index) were higher in
the surgical postmenopausal women than in premenopausal group (p<0.05). No significant inter-group
differences were found in HDL-C. Triglycerides, and
VLDL levels were higher in surgical menopause group
than in both pre- and peri-menopause groups (p<0.05).
No significant differences were demonstrated in pre-,
peri-, and natural menopausal women with regard to
triglyceride and VLDL levels and LDL/HDL-C ratio.
Conclusion : Dyslipidemia is more frequent among
women with natural and surgical menopause groups
than in the other groups. This makes those women
more susceptible to CVD. Certain co factors appear to
have direct associations with lipid levels in each group
and those were discussed.
It’s an attempt to identify the cultural activities of the Ministry of Culture, Tourism and Antiquities, which are provided by the Ministry of Culture, Tourism and Antiquities and the departments affiliated with the Ministry of Culture only, not tourism and antiquities. The most important results areIs that the Ministry of Culture, Tourism and Antiquities has many cultural activities such as (festivals, exhibitions, conferences, fashion shows, concerts, musical evenings, theatrical and cinematic performances) in addition to literary series and cultural magazines, which are directed to the public in general, whether it is elite or not, and this shows the extent The importance of cultural activities published by the Ministry of Culture, Tou
... Show MoreAs technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThe paper delves into the examination of trauma portrayals in Heather Raffo's “Noura” (2019). Raffo examines the challenges faced by two Iraqi women, Raffo and Maryam, in relation to parenthood following the capture of Iraq by “ISIS”. The paper is concerned with the various depictions of trauma that Raffo accomplishes in the text then delves in the way she cocooned her characters’ identity in order to recover their traumas. Initially, Noura is a trauma tale, illustrating the recurrent and repetitive nature of trauma from mother to daughter. The narrative reflects the interactions and dynamics between the mother and daughter and their function as substitutes for memory and recounting personal narratives. Moreover, examin
... Show MoreThe study scrutinises intermingled relations between children literature and some ecological issues. Such interwoven relationships would be highly recommended to encourage children to explore and identify themselves with nature from early ages to avoid facing an extreme experience later on. The research limits its scope to two novels Suzanne Collins’ (1962) The Hunger Games trilogy (2003-2007) and William Golding’s (1911-1993) Lord of the Flies (1954), and both novels have no direct connections with Ecology and the Eco-consciousness, yet it offers an insightful description about Man’s experience with Nature. Moreover, it raises serious moral questions, raises awareness, heals wounds and suggests solutions for the problems th
... Show MoreAbstract This paper is devoted to introduce weak and strong forms of fibrewise fuzzy u-topological spaces, namely the fibrewise fuzzy q-u-topological spaces, weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces. Also, Several characterizations and properties of this class are also given as well. Finally, we focused on studying the relationship between weakly fibrewise fuzzy q-u-topological spaces and strongly fibrewise fuzzy q-utopological spaces.
As a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreExperimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.