Background: Fibromyalgia syndrome (FMS) is the
most common rheumatic cause of diffuse pain and
multiple regional musculoskeletal pain and disability.
Objective: is to assess the contribution of serum
lipoprotein (A) in the pathogenesis of FMS patients.
Methods: One hundred twenty two FMS patients
were compared with 60 healthy control individuals
who were age and sex matched. All FMS features and
criteria are applied for patients and controls; patients
with secondary FMS were excluded. Serum
Lipoprotein (A): [Lp(A)], body mass index (BMI), &
s.lipid profile were determined for both groups.
Results: There was a statistical significant difference
between patients &controls in serum lipoprotein
A retrospective study is conducted to identify factors that improve prospective animal studies; contribute to the optimization of animal protection from all unnecessary and preventable damage. Preclinical oral histology research from 2010-2020 is evaluated and 64 studies were reviewed relating to two interventions: bone trauma and surgical incision. The harm-benefit analysis is featured in this study through the application of the recent form of Bateson's Cube. Depending on its three axes, we can assess animal suffering, the likelihood of benefit, and the importance of research. The total number of animals used in the research is 2685. Rats, 51.6%, and rabbits, 48.4%, are the most commonly used animals. Research related to bone healing acco
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreRecently times, industrial development has increased, including plastic industries, and since plastic has a very long analytical life, it will cause environmental pollution. Therefore studies have resorted to reusing recycled plastic waste (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, some studies were reviewed and then summarized into several things, including the percentage of plastic replacement from the aggregate and the effect of this percentage on the fresh properties of concrete, such as the workability and the effect of plastic waste on the hardening properties of concrete such as dry density, compressive, tensile and flexural strength.
Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought. The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data. The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreOne of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first
... Show More