Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgroups. A stable and random effect processes with standard mean division was used to evaluate the outcomes of this study in dominant and recessive groups. The purpose of the current meta-analysis was to explain the relationship of FTO rs9939609 and obesity. Results: This meta-analysis comprised 8 eligible studies including 4109 participants, comprising of 2441 cases and 1668 control measures. Meta-analysis outcomes exposed that a significant difference (P < 0.05) of the FTO genotypes appeared between the obese and the control groups. The FTO rs9939609 polymorphisms were associated significantly with the increased risk of obesity in five genotypes of adults: the AA + AT vs. TT genotypes, OR = 1.54, 95% CI = 1.34–1.77, p = 0.00001; the AA vs. AT + TT genotypes, OR = 1.40, 95% CI = 1.16–1.69, p = 0.0004; the AA vs. TT genotypes, OR = 1.79, 95% CI = 1.45–2.21, p = 0.00001; the AT vs. TT genotypes, OR = 1.47, 95% CI = 1.26–1.72, p = 0.00001; and the A vs. T alleles, OR = 1.38, 95% CI = 1.26–1.53, p = 0.00001). Conclusion: This meta-analysis reveals that the FTO gene polymorphism rs9939609 is correlated with the increasing obesity risk and A allele is also considered as a risk factor for the obesity susceptibility.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreRotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show More|
The prevalence of gastrointestinal symptoms of COVID-19 is variable with different types of presentations. Some of them many present with manifestations mimicking surgical emergencies. Yet, the pathophysiology of acute abdomen in the context of COVID-19 remains unclear. We present a case of a previously healthy child who presented with acute appendicitis with multisystemic inflammatory syndrome. We also highlight the necessity of considering the gastrointestinal symptoms of COVID-19 infection in pediatric patients in order to avoid misdiagnosis and further complications. |
The research seeks to examine the ability of fifth preparatory students in solving a mathematical problem in relation to system thinking. To this end, the researcher chose (140) fifth preparatory students from four-different secondary schools in Kirkuk city for the academic year (2016-2017). Two tests were adopted to collect study data: a test of (5) items about skills in solving math problem designed by (Al-raihan, 2006); and a test of system thinking skills designed by the researcher himself consisted of (14) items. It was divided into four skills (analyzing the main system to subsystems, eliminating all inner gaps of system, identifying the inner connection of system, and reorganizing the system). The findings indicated a good ability
... Show MoreThe meanings attributed to Female Genital Mutilation/Cutting (FGM/C) are shaped through complex negotiations within religious and socio-cultural frameworks, including those observed in Indonesia. Using a combined qualitative and quantitative (mixed methods)-ethnographic and survey approach, data from 109 students of religious tertiary institutions in East Kalimantan on their perspectives on FGM/C practices can be more comprehensively explored. The results of the study, which were analysed using the three principles of symbolic interactionism, showed that 72.5 per cent of religious college student families still practice FGM/C and 53.2 per cent stated that FGM/C practices are beneficial for women. However, they are also willing, if
... Show MoreAbstractBackground:Reduced glomeular filtration rate isassociated with increasedmorbidity in patientswith coronary arterydisease.Objectives :To analyze the declining eGFR andmortality risks in a patients with Chronic KidneyDisease and have had Coronary Artery Diseaseincluding risk factors .Patientsand Methods:The study included (160)patientsbetween the ages of 16 and 87years.Glomerular filtration rate was estimated (eGFR)using the Modification of Diet in Renal Diseaseequationand was categorized in the ranges<60 mL· min−1 per 1.73 m2and≥ 60 ml/min/1.73 m2.Baseline risk factors were analyzed by category ofeGFR,.The studied patients in emergencydepartment, were investigatedusing Coxproportional hazard models adjusting for traditiona
... Show MoreThis paper deals with two preys and stage-structured predator model with anti-predator behavior. Sufficient conditions that ensure the appearance of local and Hopf bifurcation of the system have been achieved, and it’s observed that near the free predator, the free second prey and the free first prey equilibrium points there are transcritical or pitchfork and no saddle node. While near the coexistence equilibrium point there is transcritical, pitchfork and saddle node bifurcation. For the Hopf bifurcation near the coexistence equilibrium point have been studied. Further, numerical analysis has been used to validate the main results.