Background: Chronic kidney disease is a gradual loss of kidney function with diabetes and hypertension as the leading cause. Chronic kidney disease is one of these systemic diseases that can affect salivary contents. Aims: This study aimed to assess salivary immunoglobulin A, interleukin-6 and C- reactive protein in chronic kidney disease patients on hemodialysis and those on conservative treatment in comparison with control subjects. Materials and methods: Ninety subjects were included in this study divided into three groups: 30 patients with chronic kidney disease on hemodialysis for at least 6 months ago; 30 patients with chronic kidney disease on conservative treatment and 30 healthy control subjects. Secretory immunoglobulin A, interleukin-6 and C- reactive protein in saliva samples were measured by enzyme-linked immunosorbent assay ELISA. Results: No significant difference in salivary immunoglobulin A level among study groups was seen. A significant increase in salivary interleukin-6 and C- reactive protein in both chronic kidney disease patients on hemodialysis and those on conservative treatment compared to the control group. While, no significant salivary IL-6 and CRP differences were seen between both patient groups, on hemodialysis and conservative treatment. Conclusions: There was no significant difference among chronic kidney disease patients on hemodialysis, on conservative treatment and control healthy subjects regarding to salivary IgA while Salivary interleukin -6 and C- reactive protein was significantly higher in chronic kidney disease patients on hemodialysis and those on conservative treatment compared to healthy subjects.
This study examines the species composition, biodiversity, zoogeography, and ecology of freshwater gastropods of 12 springs in Andijan region of Uzbekistan. The study used generally accepted malacological, faunistic, ecological, analytical, and statistical methods. As a result of research in the springs, 14 species of freshwater gastropods belonging to 2 subclasses, 5 families, and 10 genera were recorded. 7 of them are endemic to Central Asia. When indicators of biodiversity of mollusks were analyzed according to the Shannon index, it was found that the highest value was recorded in the springs besides the hills. According to the biotope of distribution and bioecological features, they were divided into cryophilic, phytophilic, pelophil
... Show MoreConstruction projects have a special nature and affect them many factors making them exposed to multiple risks as a result of the length of the implementation period and the multiplicity of stages, starting from the decision stage through implementation until the final delivery, which leads to increased uncertainty and the likelihood of risk.
The process of analysis and risk management is one of the effective and productive methods that are used in managing the construction projects for the purpose of increasing the chances of ending the project successfully in terms of cost, time and quality and at the lowest possible problems.
The research aims first to the effective planning for analysis and risk managemen
... Show MoreObjectives: The study aims to assess the nutritional status, identify nutrition-related health problems and
find out the relationships between nutritional status and demographic characteristics of the pregnant
adolescents in Baghdad City.
Methodology: A descriptive study was carried out from April/20/2009 to June/30/2009 through a "Nonprobability"
purposive sample of (196) pregnant adolescents their age between (13–19) years who attend (14)
primary health care centers in Baghdad City seeking for antenatal care. The data were collected by the
investigator who interviewed the pregnant adolescents and filled out the constructed questionnaire formats
which designed for the purpose of the study. Internal consistency of
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables