New derivative molecular absorption spectrophotometric methods have been developed for the determination of Al (III) , Mn (II) , individually and binary mixtures . The aim of this model of study is to obtain analytical results characterized by adequate standard of analytical figures of merits through application of derivative Spectrophotometry (dnA/d?n). The two metals acetyl acetonates are chemically stable and are widely used as catalysts . Where Interferences are probable due to very close or nearby peaks or Summits, the Zero – Crossing derivative measurement technique is used to avoid interfering effects between two metals pairs.
Aim and Objectives: The objective of this study was to illustrate the link between periodontitis (PO) and endothelial dysfunction in hypertensive patients. Materials and Methods: This cross‑sectional study involved 53 hypertensive patients with or without PO compared with 28 healthy controls. On the basis of the study protocol, the participants were divided into three groups: Group (1): 24 patients with hypertension only, Group (2): 29 patients with hypertension and PO, and Group (3): 28 healthy controls. Lipid profile, endothelin‑1 (ET‑1), and high‑sensitivity C‑reactive protein (hs‑CRP) were measured. Blood pressure and body mass index (BMI) were evaluated. Diagnostic criteria of severe PO periodontal indices including plaque
... Show MoreBackground: Invasion in oral cancer involves alterations in cell-cell and cell-matrix interactions that accompanied by loss of cell adhesion. Catenins stabilize cellular adherence junctions by binding to E-cadherin, which further mediates cell-cell adhesion and regulates proliferation and differentiation of epithelial cells. The Wnt/β-catenin pathway is one of the major signaling pathways in cell proliferation, oncogenesis, and epithelial-mesenchymal transition. Aims of the study: to detect immunohistochemical distribution pattern and different subcellular localization of β-catenin in oral squamous cell carcinoma and relate such expression to Bryne’s invasive grading system. Materials and Methods: This study included 30 paraffi
... Show MoreKE Sharquie, AA Noaimi, MA Al-Shukri, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 3
Background: Patients with type 2 diabetes have an increased prevalence of lipid abnormalities, contributing to their high risk of cardiovascular diseases (CVD).Glycated hemoglobin (HbA1c) is a routinely used marker for long-term glycemic control. In accordance with its function as an indicator for the mean blood glucose level, HbA1c predicts the risk for the development of diabetic complications in diabetic patients[2].Apart from classical risk factors like dyslipidemia, HbA1c has now been regarded as an independent risk factor for (CVD) in subjects with or without diabetes.Objective The aim of this study was to find out association between glycaemic control (HbA1c as a marker) and serum lipid profile in type 2 diabetic patients.Methods
... Show MoreThe problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
In this paper, the Magnetohydrodynamic (MHD) for Williamson fluid with varying temperature and concentration in an inclined channel with variable viscosity has been examined. The perturbation technique in terms of the Weissenberg number to obtain explicit forms for the velocity field has been used. All the solutions of physical parameters of the Darcy parameter , Reynolds number , Peclet number and Magnetic parameter are discussed under the different values as shown in plots.
The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreBackground Methotrexate (MTX) is a classical folic acid antagonist widely used in the treatment of malignant and non-malignant disorders. However, its clinical application is often restricted by concomitant adverse effects, including renal damage. Numerous studies have highlighted the role of oxidative stress and inflammation in mediating MTX-related nephrotoxicity. Therefore, the current study aimed to explore the possible renoprotective action of Citronellol (CT), a natural compound with prominent antioxidant and anti-inflammatory activities, against nephrotoxicity induced by MTX. Methods To fulfill our objective, 24 adult male Wistar rats were randomly allocated into four groups: control, MTX, 100 mg/kg CT plus MTX and 200 mg/kg C
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More