Objectives: This study aimed to evaluate the therapeutic potential effects of ascorbic acid or and pyridoxine on diabetic renal microalbumiuria. Methods: This was a cross-sectional study on patients with diabetes mellitus at Al-Yarmouk teaching hospital from January to December 2012, Iraq-Baghdad. Twenty one patients with diabetes mellitus (D.M), 8 IDDM and 13 IDDM were selected from, the duration of disease were ranged from 2-12 years for both type (10 females and 11males) and all enrolled patients ages were ranged from 28-65years. The concentration of total protein in urine was calculated by a biuret colorimetric assay and the urine creatinine level was measured by a modified Jaffe test. Statistical analysis: results are expressed as mean ± SD, for comparisons of two groups, Student’s t-test was used and statistical significance was accepted at p values < 0.05. Results: pyridoxine produced significant reduction in urinary albumin:creatinine ratio in patients with Type ?? D.M with the current therapy p?0.05 except with glimepiride p ?0.05 while the Ascorbic acid showed significant effect on albumin:creatinine in patients with Type ?? D.M after six week of treatment p ?0.05except on patient that treated with glibenclamide or glimepiride p?0.05. Combined effects of ascorbic acid 500 mg/day and pyridoxine 40mg/day on urinary albumin:creatinine produced significant reduction in albumin: creatinine ratio in both Type ? D.M and Type ?? D.M p ?0.05. Conclusions: Dual synergistic effects of ascorbic acid and pyridoxine produced more beneficial effects than either ascorbic acid or pyridoxine in amelioration of diabetic microalbuminuric nephropathy.
The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi
... Show MoreThe current research seeks to identify the most important humanitarian issues of a sacred and very important group in all the heavenly religions and human societies, namely the elderly, to identify their significant problems and health problems, and What are the effects of these problems on their mental health and which is the ultimate goal of human resources in All parts of the world? The study relied on what is available from the sources in the literature starting from the messages of heaven and the Islamic religion followed with humanitarian, social, legal and psychological postulates. The research included four systematic chapters included the definition research and identification of the problem, importance, objectives and terminolo
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
Finding a new source of resistance is important to reduce the use of synthetic pesticides, which can meet the global need of suppressing pollution. In this study, the resistance of eight eggplant cultivars to Aphis gossypii was evaluated. Results of the current study highlighted that the cultivar Long-Green has a very strong resistance after 14 days post infestation whereas Pearl-Round and White-Casper cultivars were susceptible. The rest of the tested cultivars (Green-oblong, Purple-panter, Paris, Ashbilia, and Barcelona) had mild resistance. Also, the study found significant differences between the infested and non-infested plants among the tested cultivars in the plant’s height, fresh-, and dry-weight. The susceptible cultivars
... Show MoreAn overall mathematical model for copper pipe corrosion in flowing water was derived based on mass transfer fundamentals where we introduced the effects of boundary layer velocity, bulk flow velocity and the surface oxide protective film on the corrosion rate. A set of experiments were conducted in a straight 10mm diameter copper pipe, flow of water include six velocities of maximum value 7.33m/sec at 200C and 350C. The good agreement between the calculated and experimental corrosion rate values were achieved , the agreement reached 92% .
The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit where linear operator from complete standard fuzzy normed space into a standard fuzzy normed space then belongs to the set of all fuzzy bounded linear operators
In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn
... Show More