Background: Diabetic cheiroarthropathy is a term derived from the Greek word “cheiros” meaning “of the hand”, It is characterized by stiff hands with distinctively thick, tight, and waxy skin, especially on the dorsal aspects of the hands. It is part of long term complication of diabetes and many suggest it is associated with microvascular complication. The aim of the study was to determine the prevalence of diabetic cheiroarthropathy in Iraqi patients with diabetes, and to study its association with diabetic retinopathy and glycemic control. Material and Methods: A cross-sectional study in which 110 diabetic patients and 110 non-diabetic healthy people who accepted to take part in the study were randomly recruited. 45 of the diabetic patients have Type 1 diabetes mellitus, and the other 65 have Type II diabetes mellitus. All diabetic patients and non-diabetic controls were examined for the presence of cheiroarthropathy, It’s association with sex, age of onset and duration of diabetes was recorded, the diabetic patients were also examined by an ophthalmologist for the evidence of diabetic retinopathy. Results: The total prevalence of cheiroarthropathy in all studied diabetic patients was 55.5%, while the prevalence in the control group was 4.5%. The cheiroarthropathy was more sever in Type 1 diabetes compared with Type 1I diabetes. Longer disease duration in both types of diabetes was associated with increased incidence of cheiroarthropathy, Diabetic retinopathy was higher in frequency in patients with cheiroarthropathy than in those without. Conclusions: The prevalence of diabetic cheiroarthropathy is high and nearly equal in both types of diabetes, but more sever in type 1 diabetes mellitus, it was associated with the duration of diabetes in both types and with the presence of diabetic retinopathy for only type1 diabetes mellitus.
The oyster ??????? (planned) (Pallas) of lesions that have entered Iraq recently became spyware severe damage in more than a station from power plants in Iraq, including the power plant in Mussayab Vamahar accumulates in pipes cooling and disrupts their work Vtafrtf heat systems cooling and thereby determiningefficiency and lead to added cost many cleaning or replacement of damaged parts
Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems, it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreVisible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreThis study examines the structural performance of concrete-encased pultruded Glass Fiber Reinforced Polymer (GFRP) I-sections with shear connections. It specifically focuses on how different parameters affect the latter’s ductility, flexural strength, and load-carrying capacity. The key variables studied include various shear connector types, spacing, and geometries, as well as the compressive strength of concrete and the properties of GFRP. The finite element modeling and experimental validation show that the shear connectors significantly improve the ductility, ultimate capacity, and load transmission efficiency. The present review emphasizes that the shear connectors greatly enhance the structural performance when they are prop
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show More