Multiple myeloma is hematological disease produces many complications in the bone, kidney, neural and other complications. The study aims to measure serum biomolecules like fetuin-A and resistin and determined the possibility to use these biomarkers as disease predictor. blood samples were isolated from 58 patients and 24 sex and age-matched control, serum then isolated, and proper ELISA kit then used to a determined level of B2 microglobulin, resistin, and fetuin-A. The result demonstrated significant increase in B2 microglobulin, fetuin-A and resistin in patients compare to control (1.3470.714 vs. 0.9130.253), p = 0.000, (14.00310.352 vs. 9.2594.264), p= 0.005, (1.9673.595 vs. 0.6040.622), p = 0.009, respectively. These differences give the possibility to use these biomolecules as a predictor in multiple myeloma.
Globalization has occupied a great deal of studies, research and literature, in addition to being a phenomenon that has imposed itself firmly on the ground. Globalization is considered the main feature of the current moment in today's world. The world is now transforming in an unprecedented way under noticeable titles of successive waves of knowledge and technology.The current research aims to identify the effects of globalization on the variables and their political, social, media and cultural dimensions, as well as culture of consumption and cultural identity.The theoretical framework included two sections: the first is the concept of globalization, its history and its dimensions, and the second is the modernity in contemporary Europea
... Show MoreOur aim was to investigate the inclusion of sexual and reproductive health and rights (SRHR) topics in medical curricula and the perceived need for, feasibility of, and barriers to teaching SRHR. We distributed a survey with questions on SRHR content, and factors regulating SRHR content, to medical universities worldwide using chain referral. Associations between high SRHR content and independent variables were analyzed using unconditional linear regression or χ2 test. Text data were analyzed by thematic analysis. We collected data from 219 respondents, 143 universities and 54 countries. Clinical SRHR topics such as safe pregnancy and childbirth (95.7%) and contraceptive methods
This paper is devoted to an inverse problem of determining discontinuous space-wise dependent heat source in a linear parabolic equation from the measurements at the final moment. In the existing literature, a considerably accurate solution to the inverse problems with an unknown space-wise dependent heat source is impossible without introducing any type of regularization method but here we have to determine the unknown discontinuous space-wise dependent heat source accurately using the Haar wavelet collocation method (HWCM) without applying the regularization technique. This HWCM is based on finite-difference and Haar wavelets approximation to the inverse problem. In contrast to othe
Using a mathematical model to simulate the interaction between prey and predator was suggested and researched. It was believed that the model would entail predator cannibalism and constant refuge in the predator population, while the prey population would experience predation fear and need for a predator-dependent refuge. This study aimed to examine the proposed model's long-term behavior and explore the effects of the model's key parameters. The model's solution was demonstrated to be limited and positive. All potential equilibrium points' existence and stability were tested. When possible, the appropriate Lyapunov function was utilized to demonstrate the equilibrium points' overall stability. The system's persistence requirements were spe
... Show MoreThe orient culture and heritage has directly influenced ,in a way or another , the literary works which recently have been noted by the oriental Jews inside and outside of Israel. Several Jewish writers, who came from the orient (especially from Iran ), have written their works while influenced by traditions and customs of the Iranian society, in which they were born , lived , and raised, and by the writers who were born in that society and then moved to Israel and lived there as a result of the Zionism and its notorious promises to gather Jewish people from all over the world to establish their national home at the expense of the Palestinian land and people.
That final
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreProsthetic is an artificial tool that replaces a member of the human frame that is absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients. This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More