Preferred Language
Articles
/
DhdraI8BVTCNdQwC4XdY
Correlation between Levels of Serum Prolactin and Total Sialic Acids Concentrations in Fertile and Infertile Women
...Show More Authors

The aim of this study was investigating the correlation between elevation of Prolactin levels and the increase of the concentrations of total sialic acids. The study was performed on 149 women consisted of 93 infertile hyperprolactinimic women (patients), age ranged16-38 years old, and 56 normoprolactinemic women as a control group, 18-37 years old. Serum prolactin (PRL) and gonadotroph hormones (Follicle stimulating hormone FSH and Luteinizing hormone LH) were measured using enzymatic immunoassay (EIA) method, resorcinol method for serum total sialic acids (SIA). Patients were divided into four groups, each group represented the level of prolactin of infertile women as follow: G1= (21-30), G2= (31-40), G3= (41-50), and G4= (51-60) ng/mL. Serum PRL levels in the patients groups were significantly(P≤0.05) elevated compared to the normal women. Serum SIA, FSH and LH levels showed no significant differences (P≤0.05) in the groups 1, 2, 3, and 4 when compared to healthy women (control). There was no correlation between serum prolactin hormone levels and SIA levels in the control and patients women. In conclusion there was an elevation in PRL levels, not combined with elevation in SIA, FSH, and LH levels. There was no correlation between elevation of PRL levels and total sialic acids concentrations in control and patients women. Thus, sialic acid has no correlation with the fertility or infertility in the women.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 05 2024
Journal Name
The Journal Of Obstetrics And Gynecology Of India
Obstetric and Neonatal Outcomes in Overweight Adolescent Pregnant Mothers
...Show More Authors

Background The escalating global concern over increased body weight in adolescents, coupled with the rising rates of adolescent pregnancy worldwide, presents a significant challenge to healthcare systems. We plan to identify the maternal and neonatal consequences associated with pre-pregnancy overweight in adolescent women. Methods Throughout five years, all singleton adolescent pregnant women with pre-pregnancy self-reported body mass index (BMI) of 18.5– ≤ 29.9 were involved during the first-trimester visit. Two groups were generated: overweight and appropriate-weight (BMI 25–29.9 and 18.5–24.9, respectively). Obstetric and neonatal outcomes were observed prospectively and statistically adjusted for the confounding factors.

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Engineering
GEOTEXTILE AND GEOMEMBRANE USAGE IN AN IRAQI SANDY GEOENVIRONMENT
...Show More Authors

The work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows:  with

... Show More
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More
Publication Date
Tue Apr 22 2025
Journal Name
Passer Journal Of Basic And Applied Sciences
Searching Elastic and Inelastic Coulomb Transitions in Chromium-54
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Nov 13 2024
Journal Name
Aip Conference Proceedings
On Sδ.derived and Sδ.isolated sets in supra topological spaces
...Show More Authors

The topic of supra.topological.spaces considered one of the important topics because it is a generalization to topological.spaces. Many researchers have presented generalizations to supra open sets such as supra semi.open and supra pre.open sets and others. In this paper, the concept of δ∼open sets was employed and introduced in to the concept of supra topology and a new type of open set was extracted, which was named S∼δ∼open. Our research entails the utilization of this category of sets to form a new concepts in these spaces, namely S∼δ∼limit points and S∼δ∼derive points, and examining its relationship with S∼open and S∼reg∼open. Based on this class of sets, we have introduced other new concepts such as S∼isolate

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Sublimation and the New Culture in August Wilson's Fences
...Show More Authors

August Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 07 2025
Journal Name
Political Issues
(The Libyan crisis in the Turkish and Iranian perspectives)
...Show More Authors

The Turkish intervention in the Libyan crisis in the recent period was a trigger for more tension than a solution - as Turkey claims - as Turkey seeks to quickly set a welcome military footing in Libya to prevent the reconciliation government from falling and planning to start exploration for gas and oil in Libya to solve the Turkish energy crisis, that is, the energy exchange for security and trying to exploit the situation to establish a new gathering of proTurkish political Islam, as for the Iranian position on the Libyan crisis, it does not exceed a logistical role and provide Turkey with expertise in circumventing international sanctions and assisting it in transporting fighters and weapons to Libya, Iran has also deliberately added so

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 23 2020
Journal Name
Medico-legal Update
Pro- and anti-inflammatory Cytokines in Coronavirus Disease 2019
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Academic Medicine
Academic medicine and science diplomacy: medical education in Iraq
...Show More Authors

Physicians are infrequently selected to serve in the yearlong role of Jefferson Science Fellow (JSF) as senior science advisor for the US Department of State or the United States Agency for International Development. The authors discuss the role of a JSF in promoting “science diplomacy” from the perspective of one alumnus, who sites examples of ongoing, long-term collaborative projects including one focusing on medical education reform in Iraq that would not have been possible without the JSF program. More than 3 decades of political and social unrest, terrorism, the internal displacement of millions of Iraqi citizens, the arrival of Syrian refugees, international sanctions, and the effect of fluctuating oil prices that fund education i

... Show More
Scopus (2)
Scopus