Preferred Language
Articles
/
tBfHP48BVTCNdQwC2Waj
Assessment of uric acid in patients of end-stage renal disease with hypertension and diabetic nephropathy and the risk of cardiovascular diseases
...Show More Authors

The relationship of hyperuricemia to kidney disease, diabetes, hypertension and the risk of cardiovascular diseases remain controversial. The aim of this study is to evaluate the use of uric acid (UA) levels to find the higher risk of cardiovascular disease (CVD) in patients with end stage renal disease that have diabetic nephropathy (DN), nephropathy with hypertension (NH) and patients with both diabetic nephropathy with hypertension (DNH). This study deals with 115 patients with end-stage renal disease under hemodialysis sub-grouped into 35 patients with (DN), 40 patients with (NH), and 40 patients with (DNH). Some biochemical parameters were determined in the serum of all participants such as HbA1c, fasting blood glucose (FBG), UA, urea, serum creatinine, total serum protein, calcium, phosphate, albumin, and globin levels. The present study revealed a significant increase (P<0.05) in HbA1c, FBG, urea and creatinine in DN and DNH patients compared to NH group. However, non-significant difference was found in total serum protein, serum albumin, globulin, calcium, and phosphate levels between the groups. A positive correlation was found between UA level with FBG, HbA1c and creatinine in DN and DNH groups in comparison to NH group. Levels of UA can be considered as a reliable marker, which is less expensive and helps clinicians in controlling the progression to microvascular complications. The early detection of any complication and adopting the appropriate treatment to reduce the risk of CVD can reduce morbidity and mortality.

Scopus
Publication Date
Sat Mar 13 2021
Journal Name
Al-nahrain Journal Of Science
Hiding Multi Short Audio Signals in Color Image by using Fast Fourier Transform
...Show More Authors

Many purposes require communicating audio files between the users using different applications of social media. The security level of these applications is limited; at the same time many audio files are secured and must be accessed by authorized persons only, while, most present works attempt to hide single audio file in certain cover media. In this paper, a new approach of hiding three audio signals with unequal sizes in single color digital image has been proposed using the frequencies transform of this image. In the proposed approach, the Fast Fourier Transform was adopted where each audio signal is embedded in specific region with high frequencies in the frequency spectrum of the cover image to sa

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
A Review on Pressure Transient Analysis in Multilayer Reservoir: South Iraq Case Study
...Show More Authors

Multilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Promoting Clinical Breast Examination as A screening Tool for Breast Cancer in Iraq
...Show More Authors

Breast cancer constitutes about one fourth of the registered cancer cases among the Iraqi population (1)
and it is the leading cause of death among Iraqi women (2)
. Each year more women are exposed to the vicious
ramifications of this disease which include death if left unmanaged or the negative sequels that they would
experience, cosmetically and psychologically, after exposure to radical mastectomy.
The World Health Organization (WHO) documented that early detection and screening, when coped
with adequate therapy, could offer a reduction in breast cancer mortality; displaying that the low survival rates
in less developed countries, including Iraq, is mainly attributed to the lack of early detection programs couple

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 02 2023
Journal Name
Narst 2023 Annual International Conference
Measuring Claim-Evidence-Reasoning Using Scenario-based Assessments Grounded in Real-world Issues
...Show More Authors

Improving students’ use of argumentation is front and center in the increasing emphasis on scientific practice in K-12 Science and STEM programs. We explore the construct validity of scenario-based assessments of claim-evidence-reasoning (CER) and the structure of the CER construct with respect to a learning progression framework. We also seek to understand how middle school students progress. Establishing the purpose of an argument is a competency that a majority of middle school students meet, whereas quantitative reasoning is the most difficult, and the Rasch model indicates that the competencies form a unidimensional hierarchy of skills. We also find no evidence of differential item functioning between different scenarios, suggesting

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
New Common Fixed Points for Total Asymptotically Nonexpansive Mapping in CAT(0) Space
...Show More Authors

      Strong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.

View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
Elastic magnetic electron scattering form factor in Ca-41 (M3Y fitting parameters consideration)
...Show More Authors

Elastic magnetic electron scattering form factors in Ca-41 have been investigated. 1f7/2 subshell has been adopted as a model space with one neutron, and Millinar, Baymann and Zamick 1f7/2 model space effective interaction (F7MBZ) has been used as a model space effective interaction to generate the model space vectors for the M1, M3, M5, M7, and total form factors. Discarded space (core and higher configuration orbits) have been included through the first order perturbation theory to couple the partice-hole pair of excitation with 2ћω excitation energy in the calculation of the form factors and regarding the realistic interaction density dependence M3Y as a core polarization interaction with five sets of modern fitting parameters. Fina

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST OBSERVATIONS ON PHRYNOCEPHALUS MACULATUS LONGICAUDATUS HAAS, 1957 (SQUAMATA: SAURIA: AGAMIDAE) IN IRAQ
...Show More Authors

    The present paper confirmed the presence of Phrynocephalus maculatus longicaudatus Haas, 1957 in Iraq and recorded the first observations of this taxon in Al-Muthanna province southwestern of Iraq. The existence of the species is yet uncertain in Iraq. The habitat and morphological characteristics of this species were reviewed.

View Publication Preview PDF
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More