Afamin, which is a human plasma glycoprotein, a putative multifunctional transporter of hydrophobic molecules and a marker for metabolic syndrome. Afamin concentration have been proposed to have a significant role as a predictor of metabolic disorders. Since NAFLD is associated with metabolic risk factors, e.g., dyslipidemia, insulin resistance and visceral obesity, it is considered as the hepatic manifestation of the metabolic syndrome. The objective of this study is to determine Afamin levels in hypothyroid patients with and without fatty liver disease and compare the results with controls. Also to study the relationship of Afamin level with the Anthropometric and Clinical Features (Age, Gender, BMI and Duration of Hypothyroidism) , Serum Thyroid Hormones (T3, T4 and TSH ), Lipid profile(Serum Cholesterol, TG and HDL), Liver Enzymes (GOT , GPT and ALP ) Levels , Renal Function Tests (blood Urea and serum Creatinine), Glycemic Parameters (F.B.S and HbA1c levels), Serum Hematological Parameters (PCV, MCV and WBC) and Serum Protein Parameters (Total Protein, serum albumin and serum Ferritin). Ninety individuals participated in this study and classified into three groups: G1: Hypothyroidism with fatty liver disease patients, G2: Hypothyroidism without fatty liver disease patients and G3: control subjects. All study cases were chosen from the Specialized Center in Endocrinology and Diabetes in alrisafa side / Baghdad. The age ranges of G1, G2 and G3 were (32-64), (23-67) and (24-40) years, respectively. Gender distribution shows increase in female to male ratio in all the studied groups. Results demonstrated the mean values of serum Afamin in G1 (277.688±157.725 ng/ml) and G2 (337.020±231.095 ng/ml) were very significantly higher (P=0.0001) than the mean serum Afamin in G3 (4.030±2.796 ng/ml), While the mean value of serum Afamin in G1 (277.688±157.725 ng/ml) was slightly lower than in G2 (337.020±231.095 ng/ml). The Receiving Operating Characteristic (ROC) curves analysis for serum Afamin used as a test to diagnose subjects into cases and control groups was done, and a determination of the “cut-off value” which have optimum sensitivity and specificity to diagnose disease was performed.
Evaluation of the Serum Level of Interleukin-6 in Patients Undergoing Surgical Removal of Impacted Mandibular Third Molars, Hussain A Taher*, Salwan Y Bede
Re-use of the byproduct wastes resulting from different municipal and industrial activities in the reclamation of contaminated water is real application for green projects and sustainability concepts. In this direction, the synthesis of composite sorbent from the mixing of waterworks and sewage sludge coated with new nanoparticles named “siderite” (WSSS) is the novelty of this study. These particles can be precipitated from the iron(II) nitrate using waterworks sludge as alkaline agent and source of carbonate. Characterization tests using X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) mapping revealed that the coating process was c
In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi
... Show MoreThe problem of the study and its significance:
Due to the increasing pressures of life continually, and constant quest behind materialism necessary and frustrations that confront us daily in general, the greater the emergence of a number of cases of disease organic roots psychological causing them because of severity of a lack of response to conventional treatments (drugs), and this is creating in patients a number of emotional disorders resulting from concern the risk of disease
That is interested psychologists and doctors searchin
... Show MoreBlogs have emerged as a powerful technology tool for English as a Foreign Language (EFL) classrooms. This literature review aims to provide an overview of the use of blogs as learning tools in EFL classrooms. The study examines the benefits and challenges of using blogs for language learning and the different types of blogs that can be used for language learning. It provides suggestions for teachers interested in using blogs as learning tools in their EFL classrooms. The findings suggest that blogs are a valuable and effective tool for language learning, particularly in promoting collaboration, communication, and motivation.
This study was carried out to investigate the preparation of thermosetting polymeric blend consisting of three adhesive types, namely: epoxy, polyvinyl formal (PVF) and unsaturated polyester. Both of epoxy and PVF were used as a matrix-binder at fixed weight. Whilst unsaturated polyester was used at different weights and added to the matrix so as to produce prepared epoxy-PVF-unsaturated polyester blend. Several experiments were performed at different operating conditions, mixing speed and time at room temperature to identify the most favorable operating conditions. The optimum mixing speed and mixing time for the prepared blend were 500rpm and 5 minutes respectively.
Solid wastes-synthetic sack fib
... Show MoreThe Glass Manegerie is a metaphor, which is one of the greatest plays of great writer Williams. The play talks about the poor people in society and how try to escape this group of people from the real world to get rid of the hardness of this tuff reality and live in a fantasy world that is much like the glass where the world is very weak this world is acting by Laura, she is owner of these animals breakable glass where it's weak and unable to defend itself as well as the mother Amanda is a very selfish never think about her children but only herself.
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More