Vitamin D receptor (VDR) is a nuclear transcription factor that controls gene expression. Its impaired expression was found to be related to different diseases. VDR also acts as a regulator of different pathways including differentiation, inflammation, calcium and phosphate absorption, etc. but there is no sufficient knowledge about the regulation of the gene itself. Therefore, a better understanding of the genetic and epigenetic factors regulating the VDR may facilitate the improvement of strategies for the prevention and treatment of diseases associated with dysregulation of VDR. In the present investigation, a set of databases and methods were used to identify putative functional elements in the VDR locus. Histone modifications, CpG I
... Show MoreThe evaluation of banks plays an important role in maintaining the interests of customers with the bank as well as providing continuous supervision and control by the Central Bank. The Central Bank of Iraq conducted an assessment of the Iraqi banks through the implementation of the CAMEL model during a certain period. This evaluation did not continue. The research provides continuity to the Central Bank's assessment and as a step to continue the evaluation process for all banks through the use of the CAMEL model. ROA and ROE by using the regression model for four Iraqi banks registered in the Iraqi market for securities during the period 2010-2016. The results showed that the capital and profitability indicators have a significan
... Show MoreOne of the most common metabolic illnesses in the world is diabetes mellitus. This metabolic disease is responsible for a large percentage of the burden of kidney damage and dysfunction. The goal of this study was to look into the renal function of diabetic patients using metformin monotherapy who came to Mosul's Al-Wafaa diabetes care and research facility. During the period 1 January 2021 to 30 April 2021, 47 patients with T2DM (age 50.48 7.74 years) were enrolled in this case-control study. These patients' results were compared to a control group of 47 seemingly healthy people (age 45.89 9.06 years). All participants' demographic and medical histories were acquired through the delivery of a questionnaire. Blood samples were collected
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreIn general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t
... Show MoreIn this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima