Preferred Language
Articles
/
bijps-356
Detection of Serum Ferritin in Women with Breast Cancer
...Show More Authors

 

Breast cancer is one of the most common cancers in females. In Iraq there are noticeable elevation in incidence rates and prevalence of advanced stages of breast cancer. Ferritin is intracellular iron storage protein abundant in circulation and its main application in differential diagnosis of anemia.

The level of serum ferritin was found raised in various cancers including breast cancer. The aim of this study was to assess whether the serum ferritin concentration would be altered in Iraqi women with breast cancer and it could be related to progression of disease.

Sixty eight females participated in this study. The mean age of these females was 53.25± 9.52 .The level of serum ferritin was measured in 24 Iraqi women of early stage of breast cancer (stage I and II) and 24 Iraqi women of advanced stage (III and IV). These levels were compared with 20 healthy females as controls. Serum ferritin was estimated by using enzyme linked immune sorbent assay method. This serum ferritin was found to be raised in all breast cancer patients (p<0.05) as compared to controls. The rise in ferritin level was significant in advanced stage (p<0.05) as compared to early stage. Thus the estimation of ferritin may aid in diagnosis, assessment of severity and monitoring of Iraqi women with breast cancer.

Key words: - Ferritin, Breast cancer, Iraq.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Medical Sciences
Comparison of ABGAR Score among Gestational, Pregestational Diabetes and Normal Pregnant Women
...Show More Authors

Background: The Apgar score is calculated based on the five features: heart rate, reflexes, color, muscle tone, and respiratory effort. Each element is scored from 0 to 2, with a total probable score of 10 at 1 minute and 5 minute. Aim: To study the influence of gestational diabetes mellitus (GDM) and diabetes mellitus on APGAR score in neonate. Materials and methods: The samples were studied from Department of Obstetrics and Gynaecology in Al-Imamain Al-Kadhimiyain (AS) Medical city, Baghdad Teaching Hospital and Al-Karkh Maternity Hospital in the period between 1 December 2016 and 1 may 2017, after obtaining the approval from Iraqi Ministry of Health. A total of 102 neonates were included in this study which includes 34 neonates of mother

... Show More
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
A Feminist Discourse Analysis of Writer's Gender Biases about Violence Against Women
...Show More Authors

    The present study is concerned with the writer's ideologies towards violence against women. The study focuses on analyzing violence against women in English novel to see the extent the writers are being affected and influenced by their genders. It also focuses on showing to what extent the writer's ideologies are reflected in their works. Gender influences social groups ideologies; therefore, when a writer discusses an issue that concerns the other gender, they will be either subjective or objective depending on the degree of influence, i.e., gender has influenced their thoughts as well as behaviors. A single fact may be presented differently by different writers depending on the range of a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Food Frequency Intake and Dietary Habits for Diabetic Pregnant Women
...Show More Authors

Objective: The study aims at assessing the food frequency intake and dietary habits for diabetic pregnant
women.
Methodology: A descriptive study is carried out for the period from November4th 2013 to August
25th 2014. A purposive "non-probability" sample of one hundred diabetic pregnant women is selected from
the Diabetic and Endocrine Center in Al-Amarha City. A questionnaire is developed as a tool of data
collection. Content validity of the study instrument is determined through panel of experts. Split-half
reliability technique is used for reliability determination of the study instrument which depicts a reliability
coefficient of (0.79) for the entire scale. A structured interview with each diabetic pregnant wom

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Biology And Life Science
Newcastle Disease Virus (NDV) Iraqi Strain AD2141 Induces DNA Damage and FasL in Cancer Cell Lines
...Show More Authors

The oncolytic viruses are promising form of cancer therapy which is based on the selectively killing of the cancer cells. This study was aimed to investigate the role of Newcastle disease virus (NDV) Iraqi strain AD2141 in apoptosis. Firstly, the virulence of AD2141 was detected in embryonated chicken eggs after 48hrs of infection. It was observed a hemorrhage in the skin of infected embryos that led to death. Then, the ability of this strain for regression cancer cell lines was examined. By using cytotoxicity test, it was found 128 HAU/ml of AD2141 had a potent inhibition against growth of RD and AMN3 after 72hrs of exposure time; the inhibition rate was 86.8% and 86.98% respectively. Moreover, the apoptotic activity of AD2141 was exami

... Show More
Publication Date
Wed Jun 11 2025
Journal Name
Biomedical Reports
Valproic acid exposure alters histone deacetylase mRNA expression profile in oral cancer and premalignant cell lines
...Show More Authors

View Publication
Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effects of Two Different Doses of Zinc Sulfate on Serum Troponin I 3 Enzyme Level and Cardiac Malondialdehyde Contents in Mitoxantrone-Induced Cardiotoxicity in Rats
...Show More Authors

Abstract

   Mitoxantrone is an antitumor agent used in the treatment of breast and prostate cancer, acute leukemia, lymphoma, and also in the treatment of multiple sclerosis due to its immunosuppressive properties. The mitoxantrone's cardiotoxicity is irreversible, dose-dependent, and it may occur years after treatment. Zinc is considered as an essential mineral for cell division and the synthesis of DNA and protein; furthermore, such mineral has an important role in states of cardiovascular diseases; and may have protective effects in coronary artery disease and cardiomyopathy.

Objective: The current study is designed to investigate effects of two different doses of zinc sulfat

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Meta Gene
Association of HLA-G + 3142G &gt; C gene polymorphism and toll-like receptor-9 serum level in systemic lupus erythematosus patients
...Show More Authors

Background: Human leukocyte antigen-G (HLA-G)and Toll-like receptor-9 (TLR-9)play a role in the regulation of autoimmune diseases and inflammatory processes. Aim of the study: To detect the HLA-G + 3142G > C gene polymorphism that associated with the susceptibility to SLE patients and associated with Hepatitis B infection and TLR-9 serum level. Patients and methods: This study was done on 75 SLE patients and 75 healthy control groups. Genotyping of HLA-G + 3142G > C were detected by PCR and PCR-RFLP methods. In addition to the estimation of Hepatitis B surface (HBs)antigen status by immunochromatography technique and TLR-9 serum level by ELISA technique. Results: The HLA-G + 3142G > C gene polymorphism between the SLE patients and controls

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref