Preferred Language
Articles
/
OBZn5ooBVTCNdQwC8qci
Vitamin D receptor rs2228570 and rs1544410 genetic polymorphisms frequency in Iraqi thalassemia patients compared to other ethnic populations
...Show More Authors

Background: The genetic polymorphisms of vitamin D receptor (VDR) have an association with thalassemia development, additionally to the environmental elements that elicited the disorder in the genetically predisposed individuals. As well, VDR functions responsible for the regulation of bone metabolism, such its part in immunity. Aim: The sitting study intended to inspect the association between thalassemia disease and the genetic polymorphisms of VDR among the Iraqi population then compared these findings to other findings of thalassemia patients in other different ethnic populations. Materials and methods: The restriction enzymes Bsm-I and Fok-I were applied to determine the genetic polymorphisms frequencies of VDR by a Polymerase Chain Reaction – Random Fragment Length Polymorphisms (PCR-RFLP) techniques of the targeted parts (rs2228570 and rs1544410) in 70 Iraqi patients suffering from thalassemia (18 males and 52 females) and 75 Iraqi healthy participants as a control group (18 males and 52 females). Also, the comparison between the present findings of VDR genetic polymorphisms in Iraqi thalassemia patients and other previous findings for thalassemia patients in different ethnic populations for the selected VDR Bsm-I and Fok-I sites were done. Results: The present findings manifested a significant difference of VDR Bsm-I and Fok-I genetic polymorphisms frequency (rs2228570 and rs1544410) in the thalassemia patient's group contrasted to the healthy control group. In VDR rs2228570, the AA genotype and A allele frequency were significantly increased in the patients' group contrasted to the healthy control group (44.29 vs. 8.0%, OR: 9.14, 95% CI: 3.53–23.68, p: 4.1 × 10−7; 69.0 vs. 27.0%, OR: 6.02, 95% CI: 3.27–11.06, p: 3.9 × 10−9, respectively). while, the results of VDR genetic polymorphisms rs1544410 manifested that the CC and CT genotyping and C allele frequency were significantly increased among the patient's group contrasted to the healthy control group (28.75 vs. 6.67%, OR: 5.60, 95% CI: 1.98–15.81, p: 7.2 × 10−4; 57.14 vs. 24.0, OR: 4.22, 95% CI: 2.08–8.55, p: 8.1 × 10−5; and 57.0 vs. 19.0%, OR: 6.39, 95% CI: 3.0–10.66, p: 3.9 × 10−9, respectively). Also, it manifested the genetic polymorphisms variance of VDR rs2228570 and rs1544410 between the Iraqi thalassemia patients and other ethnic thalassemia patients. The results showed different variants among the Iraqi thalassemia patients' polymorphisms and other ethnic thalassemia patients' polymorphisms. Conclusions: The present results demonstrated a significant association between the genetic polymorphisms of VDR and thalassemia disease, the AA genotype and A allele frequency was significantly increased among the thalassemia patients' group compared to the controls in VDR Bsm-I polymorphism (rs2228570). While the CC and CT genotypes and C allele frequency were significantly increased among the thalassemia patients' group compared to the controls in VDR Fok-I polymorphism (rs1544410). As well, it indicates the variance of VDR Bsm-I and Fok-I genetic polymorphisms frequencies between the Iraqi thalassemia patients and other thalassemia patients from different ethnic populations.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Automatic Approach for Word Sense Disambiguation Using Genetic Algorithms
...Show More Authors

Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 24 2021
Journal Name
Proceedings Of Sixth International Congress On Information And Communication Technology
Minimizing Costs of Transportation Problems Using the Genetic Algorithm
...Show More Authors

View Publication
Scopus (17)
Crossref (15)
Scopus Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Estimate The Survival Function By Using The Genetic Algorithm
...Show More Authors

  Survival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Pharmaceutical Sciences And Research
Synthesis and biological activity of new esters derived from D-fructose-containing isoxazole moiety
...Show More Authors

Background: Isoxazoles are an important class of five-membered unsaturated heterocyclic compounds. They show several applications in diverse areas such as pharmaceuticals, agrochemistry and industry. Isoxazoles are also found in natural sources showing insecticidal, plant growth regulation and pigment functions. Current study was conducted for synthesis of twenty five new Isoxazole derivatives and to evaluate the in vitro antibacterial activities of these derivatives. Methods: Benzaldoxime and their substituted [I] ae were prepared via addition-elimination reactions between aromatic aldehyde and hydroxylamine hydrochloride. In a second step, para-or meta-substituted benzaldoximes [I] ae were reacted with N-chlorosucceinimide in DMF to yield

... Show More
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Message in detail what was said in the parents of the Prophet  Ibn Kamal Pasha (d. 940 e) study and investigation
...Show More Authors

After Hamdallah and his success on the realization of this manuscript (a letter in detail what was said in the parents of the Prophet  Ibn Kamal Pasha (d. 940 e) study and investigation I will review some of the results reached in the realization of this manuscript:
1. The hadiths mentioned in this manuscript are mostly placed or weak.
2 - We are not entitled to speak about the silence of the law for saying Almighty ﭽ ﮮ ﮯ ﮰ ﮱ ﯓ ﯔ ﯕ ﯖ ﯗ ﯘ ﯙ ﭼ Table: 101.
3 in which harm to our Holy Prophet  وله تع ﮂ ﮃ ﮄ ﮅ ﮆ ﮈ ﮉ ﮊ ﮋ ﮌ ﮍ ﮎ ﭼ parties: 57.
4 Because the parents of the Prophet  of the people of the period ordered them to God for the Almighty ﭽ ﯨ ﯩ ﯪ ﯫ ﯬ

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Arab World English Journal
Impoliteness Formulas, Triggers, and Purposes to Refusal as Employed by Iraqi English Learners
...Show More Authors

The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) imp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 23 2022
Journal Name
Arab World English Journal
Impoliteness Formulas, Triggers, and Purposes to Refusal as Employed by Iraqi English Learners
...Show More Authors

The present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite

... Show More
View Publication
Crossref