Diabetes mellitus is a set of metabolic diseases, the most prevalent of which is chronic hyperglycemia. The culprits include insulin synthesis, insulin action, or both. Osteoporosis is a progressive systemic skeletal disorder defined by decreased bone mass and micro architectural degeneration of bone tissue, resulting in increased bone fragility and fracture risk, according to the World Health Organization (WHO). The degree of Nervosa damage determines how much a diabetic patient's body has been compromised. The current study's goal is an estimation: Age, BMI, FBS, HbA1C, D3, ALP, Ca, P, and Osteocalcin in Iraqi T2DM Women's patients with and without Osteoporosis. Three vitamins are required for Osteocalcin biosynthesis: vitamin K for Gla formation, vitamin C for hydroxylation of Pro-9 to hydroxyproline, and vitamin D for Osteocalcin production stimulation. Vitamin D is known to function in calcium homeostasis and bone metabolism . Osteocalcin is a hormone produced by osteoblasts and secreted into the extracellular matrix of bone and the bloodstream. It serves as a biological marker for bone formation. The work was classified into three groups. G1 (n= 40) is the control set that went to the Iraqi Ministry of Health's Endocrinology and Diabetes Center in Baghdad. G2 (n= 40) are patients with type 2 diabetes mellitus without Osteoporosis who visited the Endocrinology and Diabetes Center of the Iraqi Ministry of Health in Baghdad, and G3 (n= 40) are patients with type 2 diabetes Mellitus with Osteoporosis.
In this article we analysis the data of Iraqi children aged 0-9 months covered in Multiple Indicator Cluster Survey (MICS6-2018) to evaluate the nutritional status . Weight for-age z-score (WAZ), height-for-age z-score (HAZ) and BMI-for-age z-score were compared with the z-scores WHO standards. The overall prevalence of underweight and stunting of the children were 4 % and 11% respectively. Prevalence of overweight based on BMI-for-age for the sexes combined was 21%. Comparing the results obtained from MICS-6 with the results obtained from MICS-4, we find that there is an improvement in the nutritional status of Iraqi children concerning weight, but as for height, we find that there is an increase in the percentage of children who suffer fr
... Show MoreThis study aims at detecting the differences in genotyping of coding region fusA gene in clinical isolates of Acinetobacter baumannii from Baghdad, Iraq. Collected two hundred clinical samples (50 samples from urine, 50 samples from wound, 50 samples from sputum and 50 samples from otitis infections). Laboratory diagnosis for bacterial isolates carried out by some biochemical tests and confirmed by using VITEK- 2 compact system. The results appeared that twenty isolates of Acinetobacter baumannii in all these samples. Genotyping study was performed of coding region fusA gene of the extracted genome of all bacterial isolates and used specific primers in achieved amplification process of this target gene. DNA sequencing of this gene and alig
... Show MoreThe study aimed at clarifying the contradictions of the general industrial companies despite the investment allocations and the government investment expenditure on manufacturing activities under the so- called rehabilitation programs. However, this did not contribute to a certain extent in the growth and industrial leap in the direction of developing the activities of the sector Industrial sector in Iraq because of the lack of adoption of a number of basic principles towards the need to take priority of investment in the field of manufacturing and industrial decision-making in the restructuring of industry according to the priorities of investment in light of the international industrial trend, Tosmarah available to the manufact
... Show MoreThe issue of the other in the graphic design and specifically the advertising constitutes a cognitive study of the structure of the intellectual expansion in the cognitive and intellectual creative systems because of the implicit and declared embodiment it provides within the mechanisms of reading in the advertising design that appeared according to the other and through the embodiment of the textualism, the difference and the binary opposites is nothing but a reaction to the design thought and what constitutes of the manifestations of the other in advertising design. Based on the above, we review this study (Manifestations of the Other in Graphic Design) to clarify the topic through four chapters. The first chapter included the research
... Show MoreA vocative expression can be defined as an expression of direct address where the participant identity is set forth explicitly within a sentence. This study aims at showing how the vocative particles are used in literally texts, namely in the short story “The Garden Party" written by Kathryn Mansfield and identifying the forms of these vocative particles as used by the characters along with the functions of these vocative particles. For the analysis of vocative forms, the researcher used Quirk and Greenbaum (1973) model. Functionally, the data were analyzed based on Quirk et al. (1985) model. However, the results of this study shows that the characters in “The Garden Party” short story used various forms of vocative particles and
... Show MoreAbstract :
This research aims to examine the correlation and the impact of Cultural Intelligence with their dimensions (Strategy, Knowledge, Motivation, Behavior) on Drawing Local politics and their dimensions (Empowerment, Flexibility, Organizational Justice, Local Funding) In Dhi Qar Provincial Council To determine the extent of the presence of significant statistical differences between research variables Due to the recent experiment which requires clarification of the role of the pivotal and important carried out by the provincial council in the exercise of his work in light of the diversity of cultures and the peculiarities of the local community, which may impede the provision of equal services to all those parties
... Show MoreThe aim of this study is to look at the potential of a local sustainable energy network in a pre-existing context to develop a novel design beneficial to the environment. Nowadays, the concept of smart cities is still in the developmental phase/stage andwe are currently residing in a transitional period, therefore it is very important to discover new solutions that show direct benefits the people may get from transforming their city from a traditional to a smart city. Using experience and knowledge of successful projects in various European and non-European smart cities, this study attempts to demonstrate the practical potential of gradually moving existing cities to t
... Show MoreTenofovir disoproxil fumarate, a nucleotide reverse transcriptase inhibitor utilized for the treatment of hepatitis B virus and human immunodeficiency virus infections; and is now one of the most widely used antiretroviral drug. However, tenofovir disoproxil fumarate can induce nephrotoxicity, which may be attributed to the interaction between such drug and the organic anion transporters (hOAT1, and OAT3) with consequent changes in levels of some parameters that may have a role in nephrotoxicity. Thiazide diuretics have high to intermediate potency of inhibition of OAT1s and OAT3; thus, it may possess nephroprotective effects. This study was designed to investigate whether hydrochlorthiazide has nephroprotective effects on tenofovir diso
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More