Obesity is an increasing health problem in developing countries and has grown into a major global epidemic. Recent studies suggest that colonization of the stomach with Helicobacter pylori (H. pylori) may affect gastric expression of appetite and satiety-related hormones, finding that patients cured of H. pylori infection have gained weight. Further exploration of the relationship between obesity and H. pylori infection is therefore warranted. The objective of this study was to determine the prevalence of H. pylori infection in a sample of obese patients. A total of 69 obese females and 55 normal-weight females as a control group were included. Body mass indices (BMI) of all females were measured and tests for H. pylori performed. Subjects ranged in age from 20 to 59 years. The threshold for classification of obesity was a BMI of 30 kg/m² or higher. Fifty obese females (72.5%) were H. pylori positive. Thirty-two (58.2%) normal-weight females were seropositive for H. pylori, which was not significant (p > 0.05) when compared with obese group. All the obese above 45 years of age were found to be H. pylori positive. The study showed that there was no significant relation between H. pylori infection and obesity. Rather, the prevalence of H. pylori infection increases with age.
In addition to being a religious book with high human and moral themes, Nahj al-Balagha is considered a mirror of Arab culture and a literary masterpiece at the height of eloquence and eloquence, and because proverbs in the form of short, concrete and understandable phrases for everyone, experiences, thoughts and convey ideas, Imam Ali (AS) used it to facilitate the understanding of various political, social and moral concepts. In this article, we intend to criticize the way Dashti, Shahidi and Foladvand translated it by using Newmark's model due to the importance and cultural reflections of proverbs in understanding the cultural atmosphere governing Nahj al-Balagheh. In his evaluation model, Newmark divides cult
... Show Moreم. د. ولاء طارق حميد, Al. Qadisiya journal for the Sciences of Physical Education, 2017
This study aims to identify the degree of Arabic language teachers at the secondary stage possessing the teaching competencies necessary to develop the skills of literary savor among their students from the perception of educational leaders in Bisha Province. To achieve the objectives of the study, the descriptive approach was used by adopting a comprehensive survey method. The study sample consisted of (48) school principals and Arabic language supervisors in Bisha Province who supervise the teaching of Arabic language at the secondary level in Bisha Province. The necessary data was collected using a questionnaire. The results of the study revealed that the evaluation of the study sample for the degree to which Arabic language teachers
... Show MoreThe article describes the basic principles of modeling a dictionary article in the “Dictionary of the Language of Russian Folklore Lexicon epics” (M. A. Bobunova, A. T. Khrolenko). Among such principles are the principle of linguocentrism (representation of universal cognitions in strict observance of the traditions of lexicographic science), the principle of anthropocentrism (language learning as a means of human consciousness / subconsciousness), the principle of expansionism (attracting material from various knowledge bases), the principle of explanatory ("explanatory moment"), and fractal principle (synergistic potential of the presented material: nonlinearity and self-similarity; hierarchical organizati
... Show MoreAbstract:
Organizations need today to move towards strategic innovation, which means the analysis of positions, especially the challenges faced by the change in the external environment, which makes it imperative for the organization that you reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures. Now this research dilemma intellectual two-dimensional, yet my account in not Take writings and researchers effect strategic innovation in re-engineering business processes, according to science and to inform the researcher, and after the application represented in the non-application of such resear
... Show MoreTumor necrosis factor-alpha (TNF-α) antagonists’ therapy are expensive and has a non-responsive rate between 30% to 40% in rheumatoid arthritis patients. Genetic variation plays a vital role in the responsiveness to this type of therapy.The aim of this study is to investigate if the presence of genetic polymorphism in the TNF-α gene promoter region at locations -376 G/A (rs1800750), -806 C/T (rs4248158), and -1031 T/C (rs1799964) affects rheumatoid arthritis patient's tendency to be a non-responder to etanercept.
Eighty RA patients on etanercept (ETN) for at least six months were recruited from the Rheumatology Unit at Baghdad Teaching Hospital. Based on The European League Against Rheumatism response (EULAR) criteria, patient
... Show MoreSocial Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation. Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More