Background: Obesity typically results from a variety of causes and factors which contribute, genetics included, and style of living choices, and described as excessive body fat accumulation of body fat lead to excessive body, is a chronic disorder that combines pathogenic environmental and genetic factors. So, the current study objective was to investigate the of the FTO gene rs9939609 polymorphism and the obesity risk. Explaining the relationship between fat mass and obesity-associated gene (FTO) rs9939609 polymorphism and obesity in adults. Methods: Identify research exploring the association between the obesity risk and the variation polymorphisms of FTO gene rs9939609. We combined the modified odds ratios (OR) as total groups and subgroups. A stable and random effect processes with standard mean division was used to evaluate the outcomes of this study in dominant and recessive groups. The purpose of the current meta-analysis was to explain the relationship of FTO rs9939609 and obesity. Results: This meta-analysis comprised 8 eligible studies including 4109 participants, comprising of 2441 cases and 1668 control measures. Meta-analysis outcomes exposed that a significant difference (P < 0.05) of the FTO genotypes appeared between the obese and the control groups. The FTO rs9939609 polymorphisms were associated significantly with the increased risk of obesity in five genotypes of adults: the AA + AT vs. TT genotypes, OR = 1.54, 95% CI = 1.34–1.77, p = 0.00001; the AA vs. AT + TT genotypes, OR = 1.40, 95% CI = 1.16–1.69, p = 0.0004; the AA vs. TT genotypes, OR = 1.79, 95% CI = 1.45–2.21, p = 0.00001; the AT vs. TT genotypes, OR = 1.47, 95% CI = 1.26–1.72, p = 0.00001; and the A vs. T alleles, OR = 1.38, 95% CI = 1.26–1.53, p = 0.00001). Conclusion: This meta-analysis reveals that the FTO gene polymorphism rs9939609 is correlated with the increasing obesity risk and A allele is also considered as a risk factor for the obesity susceptibility.
The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreAA wahid, journal mustansiriyah of sports science, 2023
This research concerns the fact of the school garden and how can we tackle this issue. The research starts with a question forwarded to those who are interested in the ministry of education matters; the question is that how is the extent of interest in the school garden project? And how it is activated in the Iraqi Educational Institution program? In addition, the analysis reveals the importance of the school garden since we, as teachers and students, suffer from seeing the view of the trashes, the wastes of school furniture, the stinking water and the weeds and how it is accumulated in the back yard of the school. To add fuel to the fire, the increase in number of the students; year after year. This increase leads to adding more classes
... Show MoreFe, Co and Sb nanopowders were fruitfully prepared by electrical wire explosion method in Double distilled and de-ionized water (DDDW) media. The formation of iron, cobalt and antimony (FeCoSb) alloy nanopowder was monitored by X-ray diffraction. The x-ray diffraction pattern indicates that there are iron, cobalt and antimony peaks. Optical properties of this alloy nanoparticles were characterized by UV-Visible absorption spectra. The absorption peak position is shifted to the lower wavelengths when the current increases. That means the mean size of the nanoparticles controlled by changing the magnitude of the current. The surface morphological analysis is carried out by employing Scanning Electron Microscope (SEM). Particles with varies
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MorePV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building 220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More