Preferred Language
Articles
/
5hfAm44BVTCNdQwCBVXy
The role of some cytokines in diabetic patients infected with toxoplasmosis
...Show More Authors

Toxoplasmosis is the term for infection and disease in man and animal caused by a parasite called Toxoplasma gondii. The more susceptible to infect with toxoplasmosis is the Diabetic patients, due to low level of immunity response. The aim of current study is to investigate the immune status of diabetes mellitus type 2. One hundred and seventy five samples of both diabetes mellitus type 2patients and controls which had been tested by ELISA technique to detect anti-Toxoplasma Abs (IgG and IgM). The positive toxoplasmosis samples were tested to detect the level of TNF alpha and MIG. Results for all samples clarified that seronegative for IgM antibodies while 53 (53%) diabetic patients were seropositive for IgG antibodies and for toxoplasmosis only patients were 30 (40%) and 45 healthy as a (controls) were seronegative for IgG antibodies and diabetic with highly significant differences (P. value 0.0001). Serum level of TNF alpha was recorded an increase in a group of diabetic with toxoplasmosis patients (84.93 ±18.33 pg/ml) with highly differences of significant (P < 0.004) also MIG level was increased in a group of Toxoplasma gondii only (14.439 ±18.930 pg/ml) with no significant differences.

Scopus
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Al-kindy College Medical Journal
Metabolic Syndrome; Comparing the Results of Three Definition Criteria in an Iraqi Sample
...Show More Authors

Background: Different diagnostic definition and criteria have been recommended by different expert groups for the diagnosis of metabolic syndrome, however, it’s prevalence in the same population could differ depending on the definition used yielding different results. In Iraq, there is a lack of research comparing these different diagnostic definitions. Objective: To find out the most suitable metabolic syndrome definition to be used for Iraqi people.  Methods: 320 participants were recruited for this study, 53.4% men and 46.6% women, aged between 25-85 years, visiting Baghdad Teaching Hospital, the prevalence of metabolic syndrome according to different definitions were compared and the agreement was assessed by the Kappa st

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications
...Show More Authors

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Quantitative and qualitative assessment of the basic components and effective in Acol plant
...Show More Authors

Key components estimated in Acol total plant leaves and the results were as follows plant Acol humidity 72%

View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Basic training requirements for teachers from the viewpoint of supervisors in Mafraq Governorate
...Show More Authors

This study aimed to reveal the stage for teachers of basic training needs from the perspective of workers in Mafraq Governorate, through a survey of a sample of counselors look at the Ajloun area schools reached (58) counselors.
To achieve the objective of the study was constructed questionnaire where they are finalized (18) items distributed on two dimensions (professional needs, performance requirements) and after confirmation of the validity and reliability have been applied to the sample where the results showed that training needs were high, both on a professional or per formative level .
The results also showed no statistically significant differences in the areas of tool due to gender, educational qualification. The study co

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 30 2024
Journal Name
مجلة الكوفة للعلوم القانونية والسياسية
MANIPULATION OF SOFT POWER IN THE US COMPREHENSIVE STRATEGY TOWARDS FRANCE AFTER 2001
...Show More Authors

Although the events of September 2001 marked the United States' employment of solid forces in its direct comprehensive strategy to counter terrorist organizations and any other challenges to US national security, the United States did not lose sight of the importance of the cultural variable. The cultural variable is the United States' most important instrument of soft power in ensuring its dominance of the international system and promoting its global project. France viewed US soft power as a threat to its own civilizational pattern. Therefore, France considers culture to be an inherent component of its national personality and a cornerstone of its international standing as a major force. Additionally, the US-French political and economic

... Show More
View Publication
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Effect of Insurace Company Capital Adequacy in it’s Profitafility: An Empirical Study
...Show More Authors

The Purpose of this research is analysis and discussion " The Effect of Insurace Company Capital Adequacy in it’s Profitafility: An Empirical Study compared the two insurance (national, Iraqi), for a period of one year (2005) and the year (2014), as it is framed theoretical side for two topics head adequacy money the insurance company, and the profitability of the insurance company, and I've been using the research methodology and analytical, in the analysis and measurement of the capital of the insurance company adequacy, and profitability of the company, as the capital adequacy ratio was measured by dividing the total capital available on the total capital rate risk, after measured and appreciated in two insurance research, while I u

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 02 2022
Journal Name
Journal Of Physical Education
The Effect of Jigsaw Strategy on Learning Spiking in Volleyball for Sophomore Students
...Show More Authors

The research aimed at designing teaching program using jigsaw in learning spiking in volleyball as well as identifying the effect of these exercises on learning spring in volleyball. The researchers used the experimental method on (25) students as experimental group and (27) students as controlling group and (15) students as pilot study group. The researchers conducted spiking tests then the data was collected and treated using proper statistical operations to conclude that the strategy have a positive effect in experimental group. Finally, the researchers recommended using the strategy in making similar studies on other subjects and skills.

Publication Date
Sat Jun 04 2022
Journal Name
International Journal Of Language And Literary Studies
Investigating the Use of Google Meet and Face-to-Face in Teaching Conversation
...Show More Authors

conversation is an oral skill in which two persons can exchange their ideas, thoughts and opinions to communicate with each other. Learners can work in pairs or groups to practice dialogues chosen by the teacher from their textbook materials or from additional resources. Nowadays, because of Corona virus infection, our college students are taught all the subjects including conversation course either via google classroom platform or any other platforms. Google meet is one of online meetings between the teacher and students, i.e., a video meet in which students and the teacher join the online meetings in a specified time to communicate, express their ideas, thoughts and feelings about what is mentioned above. In this study, the resea

... Show More
Publication Date
Thu Jun 28 2018
Journal Name
Journal Of The College Of Education For Women
Meta – Recitation in the story of Hussein Rahim La'nat Al Hakawaty (storyteller's curse)
...Show More Authors

This research was carried out to reveal the the technique of the recitation in this story including a preface, introduction, two chapters and the conclusion. the introduction consisted of the problem, significance , purpose and limitations of research. The preface included two paragraphs. The first included a meta-recitation of terminology and semantic. The second paragraph devoted to show the cultural identity of Hussein Rahim. The first chapter aimed to reveal the reality and the imaginary in the story of Na'lat Al Hakawaty (storyteller's curse). The second chapter aimed to study the strange arguments in the story. The research concluded the conclusion by presenting the results for attaching them with the margins, and the references

... Show More
View Publication Preview PDF