Background: Osteoporosis is an extra-articular complication of rheumatoid arthritis that results in increased risk of fractures and associated morbidity, mortality, and healthcare costs. Objective: To evaluate changes in bone mineral density in a sample of rheumatoid arthritis (RA) patients on biological (anti tumor necrosis factor (TNF) alpha) and non-biological agent disease modifying antirheumatic drugs (DMARDs). Patients and Methods: A cross sectional study enrolled 60 RA patients diagnosed by rheumatologist according to the 2010 American College of Rheumatology/European League Against Rheumatism (2010 ACR/EULAR) classification criteria for RA. Thirty patient on biological agent (anti TNF alpha) and 30 patient on non-biological agent (DMARD). RA disease-related data wincluded disease duration, disease activity score index of 28 joints (DAS 28) and clinical disease activity index (CDAI), functional class, body mass index and treatment history. vitamin D level were measured in both groups. Bone mineral density was measured by dual energy x-ray absorptiometry of hip and lumber spines for patients. AT–score of equal or less than-2.5 standard deviation that of young healthy adults were taken as osteoporotic and scores between-1 to-2.5 standard deviation was taken as osteopenic. Results: Prevalence of RA patients on biological agent (anti TNF alpha) who had osteoporosis was 1 (3%) and 12 (40%) were osteopenic, and in patients on non biological (DMARD), Osteoporosis was present in 8 (26%) and osteopenia in 13 (43%, p= 0.019). Vitamin D level in patient on biological agent (anti TNF alpha) was low in 24 (80%) and normal …
In this paper, the using of Non-Homogenous Poisson Processes, with one of the scientific and practical means in the Operations Research had been carried out, which is the Queuing Theory, as those operations are affected by time in their conduct by one function which has a cyclic behavior, called the (Sinusoidal Function). (Mt / M / S) The model was chosen, and it is Single Queue Length with multiple service Channels, and using the estimating scales (QLs, HOL, HOLr) was carried out in considering the delay occurring to the customer before his entrance to the service, with the comparison of the best of them in the cases of the overload.
Through the experiments
... Show MoreAn experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .
In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.
The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on leather
... Show MoreThe dyes Azo have a lengthy history and are a vital part of our daily lives. There are numerous potentials uses for these substances and their derivatives in various industries and environmental and biological research. In this study conversion of various azo compounds into other derivatives, complexes, and polymers was accomplished. This review included examining the chemistry reactions, synthesis, and applications of azo dye ligands and their complexes, mentioned spectral, analytical, thermal, and morphology methods of investigation, and confirmed by mass fragment mechanisms for some azo dyes and metal complexes. One of the aims of this review is to explain the role of these azo dye derivatives and the effect of metal complexes on
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreSM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MorePsidium guajava, belonging to the Myrtaceae family, thrives in tropical and subtropical regions worldwide. This important tropical fruit finds widespread cultivation in countries like India, Indonesia, Syria, Pakistan, Bangladesh, and South America. Throughout its various parts, including fruits, leaves, and barks, guava boasts a rich reservoir of bioactive compounds that have been traditionally utilized as folkloric herbal medicines, offering numerous therapeutic applications. Within guava, an extensive array of Various compounds with antioxidative properties and phytochemical constituents are present, including essential oils, polysaccharides, minerals, vitamins, enzymes, triterpenoids, alkaloids, steroids, glycosides, tannins, fl
... Show MoreThis study aims to identify the impact of using the infrastructure of the Information Technology (IT) on the performance of human resources in the public universities. This process is done by doing research in the size, quality, and efficiency of the performance, also speed of achievement and simplification of procedures. Diyala University was chosen for the diagnosis through the opinions and attitudes of its employees. Consequently, suggestions that contribute to improve the performance of the employees and thus its overall performance are obtained. Another objective of this study is identifying the human resources which are currently used in academic institutions and educational services systems because the significant role of th
... Show More