The relationship of hyperuricemia to kidney disease, diabetes, hypertension and the risk of cardiovascular diseases remain controversial. The aim of this study is to evaluate the use of uric acid (UA) levels to find the higher risk of cardiovascular disease (CVD) in patients with end stage renal disease that have diabetic nephropathy (DN), nephropathy with hypertension (NH) and patients with both diabetic nephropathy with hypertension (DNH). This study deals with 115 patients with end-stage renal disease under hemodialysis sub-grouped into 35 patients with (DN), 40 patients with (NH), and 40 patients with (DNH). Some biochemical parameters were determined in the serum of all participants such as HbA1c, fasting blood glucose (FBG), UA, urea, serum creatinine, total serum protein, calcium, phosphate, albumin, and globin levels. The present study revealed a significant increase (P<0.05) in HbA1c, FBG, urea and creatinine in DN and DNH patients compared to NH group. However, non-significant difference was found in total serum protein, serum albumin, globulin, calcium, and phosphate levels between the groups. A positive correlation was found between UA level with FBG, HbA1c and creatinine in DN and DNH groups in comparison to NH group. Levels of UA can be considered as a reliable marker, which is less expensive and helps clinicians in controlling the progression to microvascular complications. The early detection of any complication and adopting the appropriate treatment to reduce the risk of CVD can reduce morbidity and mortality.
תקציר :
המחקר הזה הוא ניסיון לשפוך אור על נושא מרכזי וחשוב בחייהם של היהודים, "הממד הדתי" אצל היהודים, מחקרי הנקרא "הממד הדתי בסיפור העברי המודרני" גם מתייחס להשפעת התרבות הדתית של המספר והחוג המשפחתי שחי בו, ואיך שיקף המספר את כל הדברים האלה ביצירותיו הסיפורית .
המספר בוחר במילים ובמונחים בעלי משמעויות דתיות או מביא את הסיפור הזה אשר קרוב אל נושא הסיפור ההולך באותה מגמה .גם כן השפעת התיאולג
... Show MoreMobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co
... Show MoreThis study was conducted with the aim to extract and purify a polyphenolic compound “ Resveratrol†from the skin of black grapes Vitis vinifera cultivated in Iraq. The purified resveratrol is obtained after ethanolic extraction with 80% v/v solution for fresh grape skin, followed by acid hydrolysis with 10% HCl solution then the aglycon moiety was taken with organic solvent
( chloroform). Using silica gel G60 packed glass column chromatography with mobile phase benzene: methanol: acetic acid 20:4:1 a
... Show MoreNonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.
We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas
Manipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)
... Show MoreThe downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreThe aim of t his p aper is t o const ruct t he (k,r)-caps in t he p rojective 3-sp ace PG(3,p ) over Galois field GF(4). We found t hat t he maximum comp let e (k,2)-cap which is called an ovaloid, exist s in PG(3,4) when k = 13. Moreover t he maximum (k,3)-cap s, (k,4)-cap s and (k,5)-caps.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More