Preferred Language
Articles
/
CBdfXI8BVTCNdQwCCG5w
Detection of Iron and Ferritin in Diabetes Mellitus Type 2 Patients
...Show More Authors

Scopus
Publication Date
Mon May 06 2024
Journal Name
Journal Of Pakistan Association Of Dermatologists
Assessment of tumor necrosis factor alpha and interleukinـ10 in obese psoriatic patients before and after using apremilast
...Show More Authors

Background Psoriasis is one of the most prevalent chronic inflammatory skin conditions; its prevalence ranges from 1 to 3%. Tumor necrosis factor-alpha (TNF-α), a cytokine that enhances inflammation, is overexpressed in synovium and skin plaques in psoriasis. TNF-α plays a critical role in the pathogenesis of psoriasis. IL-10 is the most crucial cytokine for reducing excessive immune responses and decreasing pro-inflammatory reactions in all autoimmune disorders.   Objective To evaluate the effect of Apremilast on ILـ10, TNFـα, and BMI in obese psoriatic patients.   Methods Thirty patients included in this investigative study to measure the concentrations of TNFـα, ILـ10 and BMI, before and after receiving Apremilast. TNFـα and

... Show More
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
GH and IGF-2 Histological Effects on the Heart, Liver and Gizzard of Chickens were Studied
...Show More Authors

GH and IGF-2 were examined histologically in the present study on adult hens to learn more about the organs’ responses to GH and IGF-2. Cardiac protein synthesis is stimulated by GH and IGF-2, according to microscopic examination. The recent research found a considerable amount of adipose tissue in the cardiac muscle bundles, which is linked to the metabolic process. In addition, GH and IGF-2 were shown to promote protein synthesis and mitosis in liver and gizzard tissues, according to the research. In addition, the apoptosis, regeneration, and secretory activity of gizzard glands are increased by the aforementioned hormones.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activity Evaluation of Some Pyrazoles, Thiazoles and Oxazoles Derived from 2-Mercaptoaniline
...Show More Authors

    Synthesis of 2-mercaptobenzothiazole (A1) is performed from the reaction of  o-aminothiophenol and carbon disulfide CS2 in ethanol under basic condition. Compound (A1)  is reacted with chloro acetyl chloride to give compound (A2). Hydrazide acid compound (A3) is obtained from the reaction of compound (A2) with  hydrazine hydrate in ethanol under reflux in the presence of glacial acetic acid .The reaction of hydrazide acid compound (A3) with ethyl acetoacetate gives pyrazole compound (A4). The new hydrazone  compound (A5) was prepared from the reaction of compound (A3) with  benzaldehyde. Reaction of compound

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Russian Journal Of Bioorganic Chemistry
Synthesis, Identification and Study of Antioxidant and Anticancer Activities of New 2-Substituted-1,3,4-Thiadiazole from Creatinine
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Science
Using of Remote Sensing Technique to Monitor The Status of The Plant and Change Detection for Three Different Periods in Western Region in Baghdad/ Iraq
...Show More Authors

Data of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased

... Show More
View Publication
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref