Polycystic ovary syndrome (PCOS) is the main cause of female infertility. The role of insulin resistance in the development of polycystic ovary is actively discussed here. The study included patients with PCOS without insulin resistance (n = 48) and with insulin resistance (n = 39). The comparison groups were patients with no history of PCOS: a control group without insulin resistance (n = 46) and a group of patients with insulin resistance (n = 45). The following parameters were determined in patients: FSH, LH, TSH, T3f, T4f, PRL, E2, 17-OHd, Pr, AMH, Test total, Testf, DHEAS, DHEASs, SHBG, ACTH, cortisol, IRI, IGF-1, C-peptide, and glucose level. The HOMA-IR index and the LH / FSH ratio and the total / SHBG test were calculated. Correlation analysis was also performed between HOMA IR and indicators of the hormonal profile, IGF-1, and C-peptide.Unidirectional changes in the levels of the following hormones were found in insulin resistance, PCOS and / or insulin resistance relative to control values: estradiol, total testosterone, cortisol, prolactin, AMG, and SHBG. As a result of the correlation analysis, negative relationships were established between the HOMA IR Index and the levels of E2, cortisol and AMH in patients (except for the control group).We assume that the formation of the phenotype of polycystic ovary with a combination of insulin resistance can be formed in patients with insulin resistance as a result of a decrease in the level of estradiol, SHBG and an increase in the content of total testosterone and AMH.
This study aims at identifying the extent of SMS usage and understanding the role it plays in satisfying users' needs and motivations. In order to achieve this aim, an analytical descriptive method was adopted by conducting a field survey among students at Petra University.
The study resulted in many conclusions, the most important of which is that using SMS meets the students' cognitive, social and communicational needs and desires, the highest being communicating with friends at 75%, followed by exchanging songs and videos at 52%, as well as exchanging photos at 45%. In regards to their motivation for using text messaging, forgetting daily problems scored highest at 81.4% and spending free time followed at 77.4%. This proves th
... Show MoreObjectives: To determine the impact of an educational program on nurses’ knowledge
and practices concerning neurogenic bladder rehabilitation for spinal cord injured persons
through a follow-up approach each two months post program implementation for six
months.
Methodology: "Follow-up" longitudinal design by using time series approach of data
analysis and the application of pre-post tests approach for the study and the control
groups. The study was carried out at Ibn Al-Kuff hospital for (SCI) in Baghdad governorate
from 5th of July 2010 to 15th of October 2011. To achieve the objectives of the study, a
non-probability (purposive) sample of (60) nurses (males and females) were working in SCI
units were selec
Industrial development has recently increased, including that of plastic industries. Since plastic has a very long analytical life, it will cause environmental pollution, so studies have resorted to reusing recycled waste plastic (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, producing environmentally friendly load-bearing concrete masonry units (blocks) was considered where five concrete mixtures were compressed at the blocks producing machine. The cement content reduced from 400 kg/m3 (B-400) to 300 kg/m3 (B-300) then to 200 kg/m3 (B-200). While (B-380) was produced using 380 kg/m3 cement and 20 kg/m3 nano-sil
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show More