KE Sharquie, AA Al-Nuaimy, WJ Kadhum, Saudi medical journal, 2006 - Cited by 3
Reintervention after balloon angioplasty is often considered inevitable in children with coarctation of the aorta (COA). The present study aimed to evaluate predictors of re-intervention after balloon angioplasty for COA, with the goal of identifying patient and procedural characteristics that may influence long-term outcomes
Although cinema is moving towards art, it has dealt with the character since the beginning of the discovery of cinematic art in films such as (Doctor Caligari's cabin) and most German expressive films in the third decade of the twentieth century, but the interest of cinema is growing in the estranged human personality, meaning that this character It lives by its alienation from the environment and society that surrounds it, because our present days have witnessed on the material and moral level more social breakdowns such as wars and disasters, and the sharp contradiction in the social and economic level of people themselves or between different societies, or between the individual and his community, and new social relations have increas
... Show MoreAbdominal fat synthesizes a variety of adipokines, including vaspin and chemerin, that affect the resistance to insulin. This research was conducted to demonstrate the effect of pioglitazone, one insulin sensitizer used to decrease insulin resistance, on these adipokines in obese patients with polycystic ovary (PCOS). Twenty-five obese women with PCOS were treated with pioglitazone 15mg/bid for 12 weeks. Modifications in fasting blood glucose (FBG), serum fasting insulin (FSI), chemerin and vaspin serum levels, follicle stimulation hormone (FSH), luteinizing hormone (LH), testosterone (T), and in baseline and post-therapy were assessed. Body mass index decreased without any substantial variance after 12 weeks of piogl
... Show MoreThe present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite
... Show MoreThe present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) imp
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show More