The most common cause of acquired thyroid dysfunction is autoimmune thyroid disease (AITD), which most commonly manifests as Hashimoto's thyroiditis (HT) or Graves' disease (GD). The importance of vitamin D (vit D) as an immune modulator has recently been emphasized in several types of disorders. However, its significance in thyroid illnesses is not fully understood. The purpose of this study is to investigate how vitamin D affects the pathophysiology of hyperthyroidism and hypothyroidism in Iraqi women. One hundred Iraqi women with age ranged from 18 to 60 years participate in this research, 50 of them were hypothyroidism patients, 30 were hyperthyroidism patients and the other 20 were euthyroidism served as controls. Blood samples
... Show MoreAndalusian women enjoyed much historical news in the fluorescence of Andalusia, describing it as beautiful and good cohabitation, as the men were involved in conquests, including those who were wives of the caliphs, including scientists, singers, and adept writers Hassan and tongue, in addition to the acquisition of masters in slave markets in Cordoba, Seville and many cities, In addition, Andalusian women enjoy freedom in their relationship with men and have been reflected in the historical fluorescence of Andalusia, such as the book of the history of Ibn Abdul Malik bin Habib al-Alberi (d. And the collar of the dove repented in intimacy and thousands of Ibn Hazm al-Qurtubi (d. 456 AH / 1065 CE), the book of Hilla al-Sayra of Ibn al-Wel
... Show MoreThe implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiven
... Show MoreUniversity libraries seek to evaluate their performance in order to correct their path and adjust it in the right direction. Therefore, they use (performance indicators), which are a tool used by institutions to evaluate the weaknesses and strengths in their work and the reasons for failure to achieve some goals sometimes. They convert (goals, procedures and actions) into a formula that can be measured mathematically, which contributes to the library determining the gap between its current performance and what those libraries are supposed to be on, clarifying the path that the library is following, controlling the risks that may befall it, and thus enhancing the process of continuous improvement to avoid areas of failure and weakness becaus
... Show MoreThe subject of children's rights in the modern era of the priorities of educators , because the child in the community is the future , which is held by the hope which is the basis for society in the renaissance and progress so quickly communities to prove these rights through its various institutions and issued legislation and held numerous conferences and taking specialists the field of childhood Aatron aspects of this rights and Aasalunha including a benefit for children until tomorrow for the rights of children , psychological and social health and educational . Therefore, the current study focused on the awareness of parents and educators of children's rights as individuals most closely satisfying their needs and rights. The
... Show MoreRutting in asphalt mixtures is a very common type of distress. It occurs due to the heavy load applied and slow movement of traffic. Rutting needs to be predicted to avoid major deformation to the pavement. A simple linear viscous method is used in this paper to predict the rutting in asphalt mixtures by using a multi-layer linear computer programme (BISAR). The material properties were derived from the Repeated Load Axial Test (RLAT) and represented by a strain-dependent axial viscosity. The axial viscosity was used in an incremental multi-layer linear viscous analysis to calculate the deformation rate during each increment, and therefore the overall development of rutting. The method has been applied for six mixtures and at different tem
... Show MoreInternet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets.
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More