Patients with renal failure in the final stages undergo the treatment by hemodialysis. Hemodialysis is used to reinstate the intracellular and extracellular fluid environment, by propagation of molecules in solution through a semipermeable membrane along an electrochemical concentration gradient. Blood catching in the dialysis machine and the recurrent phlebotomy may lead to losing about 1-3 g of iron per year. Prohepcidin hormone is an acute phase protein (type II) that plays a major role in the systemic iron irregularities as it is a mediator of anemia in inflammation and regulator of iron metabolism. This study aims to evaluate the effect of hemodialysis on iron hemostasis and its relationship with prohepcidin as an inflammatory marker. This study includes forty four adult male patients with end-stage renal failure (in pre and post –treated) by means of chronic hemodialysis-HD with mean age (53.27 ± 13.76 years). The following biochemical investigations have been studied: Prohepcidin, Iron, Ferritin, Transferrin, Total Iron-Binding Capacity (TIBC), The Unsaturated Total Iron Binding Capacity (UIBC), and transferrin saturation (TAST).Decrement of Prohepcidin level on hemodialysis patients in post dialysis with non-significantly compared to pre dialysis, while iron and ferritin was increment in post treated than pre- treated with non-significantly.Hemodialysis affects Prohepcidin levels as it was long duration and Glomerular Filtration rate GFR (cock croft equation) and prohepcidin level affect the iron profile related with the iron store depletion.
A field experiment was conducted during the spring season 2020 in Karbala proving/ Al-Sharia Distrit, located at latitude N 32° 42' 13.8" and longitude E 43° 54' 36.6" and at an altitude of 27 m above sea level. The experiment included a study of two factors: the first, Irrigation Interval, three treatments were used: irrigation treatment every 2 days, Irrigation treatment every 4 days, and Irrigation treatment every 6 days. The second factor is the addition of soil conditioners, in which four treatments were used: the control treatment without any addition, the treatment of adding bio-organic fertilizers, the treatment of adding water-conserving technology (polymer), and the treatment of adding water-conserving technology + fertilizers O
... Show MoreWe have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.
The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F
... Show MoreA streptococci has recognized as Streptococcus spp., associate with acute pharyngitis. S. pyogenes infection Has detected in the Hospital and Health Center in Tikrit city. Throat swabs sample has obtained and cultured on a sheep blood agar plate. Identification of S. pyogenes was performed by using the VITEK 2 automatic system. It detected of 50 samples from children included 25 were positive for S. pyogenes infection. were aged 10-35 years old and included 30 male and 20 female. . While 25 sample Negative of S. pyogenes infection (The control group included 25 clinically healthy children without S. pyogenes infection matched for age and sex with cases pateints). No significa
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreAbstract :This research aims to examine the correlation and the impact of Strategic leadership on Achieving Organizational in some of establishments in ministry of construction and housing which is under public founds, Starting from the importance of research in public organizations and the importance of these organizations to the community, it is rely descriptive analytical methods in achievement of this research, the research involved board of directors, Data has collected from (92) respondents, represent the respondent society exclusively and comprehensively, it involved the general directors, assistant general directors and heads of department, The research relied programs (Excel 2010, Spss V.21), moreover, some o
... Show More
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show More