Both type 1 diabetes and type 2 diabetes have a genetic component, with over 60 chromosomal regions related to type 1 diabetes and over 200 connected with type 2 diabetes at significant genome-wide levels. Numerous single nucleotide polymorphisms in the RETN gene and genetic variables can account for up to 70% of the variations in circulating resistin levels. The RETN polymorphism has been linked in numerous studies to obesity, insulin sensitivity, type 2 diabetes, and cerebrovascular illness. Our objective is to compare this RETN gene 3ʹ-untranslated region polymorphism in type 1 diabetes and type 2 diabetes Iraqi patients. We choose 51 type 1 diabetes and 52 type 2 diabetes patients against 50 healthy subjects (control group) to investigate the comparative RETN gene polymorphisms in patients with type 1 diabetes and type 2 diabetes, using conventional polymerase chain reaction. The present study revealed statistically there was no significant increase in CC, CG, and GG genotypes (with Odd Ratio 1.43, 0.82, and 0.62 respectively) in type 1 diabetes, and statistically there was no significant increase in CC, CG, and GG genotypes (with Odd Ratio 0.68, 1.02 and 1.97 respectively) in type 2 diabetes as compared to the control group. Also, we found statistically there was no significant increase in C and G alleles in type 1 diabetes and type 2 diabetes groups as compared to the control group. The findings suggest that the CC genotype and C allele in RETN gene 3ʹ-untranslated region polymorphism rs1862513 increase the risk of type 1 diabetes compared to CG and GG genotypes, and the G allele in this gene increases the risk of type 2 diabetes in Iraqi patients.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe present research aimed to test the imagination of children, and may build sample consisted of (400) a baby and child, selected by random way of four Directorates (first Resafe, second Resafe ,first alkarkh , second alkarkh), in order to achieve the objective of research the tow researchers have a test of imagination and extract the virtual and honesty plants distinguish paragraphs and paragraphs and difficulty factor became the test consists of (32), statistical methods were used (Pearson correlation coefficient, coefficient of difficult passages, highlight paragraphs, correlation equation, an equation wrong Standard) the tow researchers have a number of recommendations and proposals.
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
The physician's commitment to medical insight is affected by several factors that vary from patient to patient in terms of the nature of the disease, the severity of the disease, the age of the patient, and the purpose of undergoing medical intervention. There are circumstances surrounding patients that require the physician to reduce the insight towards them, by concealing medical information. The physician must firmly commit to expanding the scope of his vision to a wider extent than in normal medical work. Therefore, we will discuss in this regard the cases in which medical explanation is reduced and the cases that require confirmation in the following order.
Significant advances in the automated glaucoma detection techniques have been made through the employment of the Machine Learning (ML) and Deep Learning (DL) methods, an overview of which will be provided in this paper. What sets the current literature review apart is its exclusive focus on the aforementioned techniques for glaucoma detection using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) guidelines for filtering the selected papers. To achieve this, an advanced search was conducted in the Scopus database, specifically looking for research papers published in 2023, with the keywords "glaucoma detection", "machine learning", and "deep learning". Among the multiple found papers, the ones focusing
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show More