Since cancer is becoming a leading cause of death worldwide, efforts should be concentrated on understanding its underlying biological alterations that would be utilized in disease management, especially prevention strategies. Within this context, multiple bodies of evidence have highlighted leptin’s practical and promising role, a peptide hormone extracted from adipose and fatty tissues with other adipokines, in promoting the proliferation, migration, and metastatic invasion of breast carcinoma cells. Excessive blood leptin levels and hyperleptinemia increase body fat content and stimulate appetite. Also, high leptin level is believed to be associated with several conditions, including overeating, emotional stress, inflammation, obesity, and gestational diabetes. It has been noted that when leptin has impaired signaling in CNS, causing the lack of its normal function in energy balance, it results in leptin resistance, leading to a rise in its concentration in peripheral tissues. Our research paper will shed highlighting on potentially targeting the leptin receptor and its cellular signaling in suppressing breast cancer progression.
The media plays an important role in a number of functions performed by them. Press is one of those media which had and still have a clear role in addressing the various issues, topics, and events. Journalism is no longer as expressed by owners of the liberal theory – it seeks to raise the instincts – but it began to excite the minds of readers to meet their needs. At the same time, it does not neglect the search for the truth and work to deliver it to readers. Some have identified a set of tasks carried out by the press including the interest in public affairs, the needs of the community, work to provide happiness, what is beneficial and useful and combat the negative phenomenon and to address the deviations facing society. The comi
... Show MoreAfter the political change in Iraq in 2003, Iraq witnessed a stage of social and political development and the strengthening of the legal foundations of the state system, by the approval of the permanent Iraqi constitution of 2005, and stipulating the quota system.
Iraqi women participated in the parliamentary elections from 2005 until 2021, and despite the participation of Iraqi women in all elections, there are challenges that women in Iraq face that prevent their political participation in general and participation in parliament in particular. There are factors behind this, including those related to Iraqi women themselves, including those concerning the political institution and factors related to the nature of society, and it
... Show Moreكانت وسائل الاعلام- التقليدية والحديثة – وستبقى وسيلة مهمة لتدفق المعلومات والتعبير عن المشاعر ووصف الاحداث وتشكيل الرأي العام المحلي والدولي عن مختلف القضايا التي تهم الافراد والمجتمعات وفي مقدمتها قضايا العنف بمستوياته كافة ،والتطرف الديني والارهاب بكل مسمياته وستحاول هذه الدراسة ان تقدم اجابات عن اسئلة محددة تمثل الاطار النظري لدراسات مسحية ترصد النظريات التي ترسم الاطر النظرية الت
... Show MoreThe Economist opinion (views) gathered on the great Importance’s of small enterprise on the production sectors at Developed or in developing countries, statistics indicate that these enterprise represent almost 90% of the total enterprises in most economies in the world.
Many of these enterprises have originated in Iraq since the beginning of last century and the question of financing these enterprises remained an issue facing the most of workers in this sector, because of the peculiarty of which are characterized by which as a lack of financial abilities and the difficulty of obtain the sources of financing in Iraq and considered the enterprise as the guarantor of fulfilling Financial obligations. Afte
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
Biosensor is defined as a device that transforms the interactions between bioreceptors and analytes into a logical signal proportional to the reactants' concentration. Biosensors have different applications that aim primarily to detect diseases, medicines, food safety, the proportion of toxins in water, and other applications that ensure the safety and health of the organism. The main challenge of biosensors is represented in the difficulty of obtaining sensors with accuracy, specific sensitivity, and repeatability for each use of the patient so that they give reliable results. The rapid diversification in biosensors is due to the accuracy of the techniques and materials used in the manufacturing process and the interrelationshi
... Show MoreThe futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu
... Show MoreAs a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software across numerous fields and communities may now be processed through value chain networks. Despite the integration of all data networks, computing models, and distributed software that provides a broader cloud computing solution, the security solution is missing or inadequate, and more work is required to strengthen security requirements such as mutual entity trustworthiness, access controls, identity management, and data protection, all aspects of detecting and preventing attacks or threats. In order to combat cybersecurity threats, various international organizatio
... Show MoreData mining is one of the most popular analysis methods in medical research. It involves finding patterns and correlations in previously unknown datasets. Data mining encompasses various areas of biomedical research, including data collection, clinical decision support, illness or safety monitoring, public health, and inquiry research. Health analytics frequently uses computational methods for data mining, such as clustering, classification, and regression. Studies of large numbers of diverse heterogeneous documents, including biological and electronic information, provided extensive material to medical and health studies.