Preferred Language
Articles
/
bijps-620
The Effects of Melatonin On The Oxidative Stress , Protein Glycation , Microalbuminuria and Lipid Profile In Type II Diabetes Mellitus
...Show More Authors

Previous studies indicated that supplementation with antioxidants has a protective effects against oxidative stress–induced damage in type 2 diabetes. In this study we evaluated the antioxidant effects of melatonin on the oxidative stress parameters and microalbuminuria in type 2 DM patients. 30 patients with type 2 DM were treated with 3mg/day melatonin for 90 days. Erythrocytes and plasma MDA and glutathione, fasting plasma glucose, %HbAIC, microalbuminuria, total plasma protein and lipid profile were measured each 30 days and compared with those obtained from 20 healthy controls.

A decrease in MDA levels associated with the elevation in GSH levels were observed, compared with the pre–treatment levels. Fasting plasma glucose, glycated hemoglobin and microalbuminuria were significantly decreased, associated with an improvement in the total cholesterol, HDL–C and LDL–C levels, with respect to the pretreatment values.In conclusion , treatment of type 2 DM patients with melatonin may have protective effects against the oxidative stress–induced damage during the course of type 2 DM.

Key words: Diabetes Mellitus, Oxidative Stress, Melatonin,Microalbuminuria.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 18 2018
Journal Name
Https://www.iasj.net/iasj/article/170012#:~:text=al.qadisiya%20journal%20for%20the%20sciences%20of%20physical%20education
The Effect Of Using Two Strategies For Active Learning ( Jigsaw Strategy & Problems Solving) In Learning Some Balanced Beam's Skills In Artistic Gymnastics
...Show More Authors

The aim of this study to identify the effect of using two strategies for active learning ( Jigsaw Strategy & Problems Solving) in learning some balanced beam's skills in artistic gymnastics for women , as well as to identify the best of the three methods (jigsaw strategy , problems solving and the traditional method) in learning some skills balance beam , the research has used the experimental methodology, and the subject included the students of the college of Physical Education and Sports Sciences / University of Baghdad / third grade and by the lot was selected (10) students for each group of groups Search three and The statistical package for social sciences (SPSS) was used means, the standard deviation and the (T.test), the one way a n

... Show More
Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Study of the genetic diversity in three species belonging to family: Daphniidae (Crustaceae, Cladocera) collected from different regions in Baghdad Province/Iraq
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Jun 18 2022
Journal Name
Sciencescholar Publication
Logical reasoning skills according to Piaget's model for chemistry students in the college of education for pure sciences Ibn al-Haytham in
...Show More Authors

Abstract---The aim of the current research is to identify the level of logical reasoning skills in chemistry students at the Faculty of Education for Pure Sciences/ Ibn Al-Haytham for the academic year (2021-2022). The differences in their level of skills according to the gender variable (males and females) and the academic stages (first- second - third - fourth). The descriptive approach was adopted because it corresponds to the nature of the research objectives. The research sample consisted of (400 )students selected in a relatively random stratified way. The researcher constructed a logical reasoning test, which includes (6) sub-skills , which is (proportional - probabilistic- synthetic- deductive- logic- variable adjustment). The psych

... Show More
Preview PDF
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
A study to compare the cleaning efficiency of different irrigation systems for macro debris removal in instrumented canals (An in vitro study)
...Show More Authors

Background: Irrigation of the canal system permits removal of residual tissue in the canal anatomy that cannot be reached by instrumentation of the main canals so the aim of this study was to compare and evaluate the efficiency of conventional irrigation system, endoactivator sonic irrigation system,P5 Newtron Satelec passive ultrasonic irrigation and Endovac irrigation system in removing of dentin debris at three levels of root canals and to compare the percentage of dentin debris among the three levels for each irrigation system. Materials and methods: Forty extracted premolars with approximately straight single root canals were randomly distributed into 4 tested groups of 10 teeth each. All canals were prepared with Protaper Universal ha

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Parasitology
The antifungal Aureobasidin A and an analogue are active against the protozoan parasite<i>Toxoplasma gondii</i>but do not inhibit sphingolipid biosynthesis
...Show More Authors

Toxoplasma gondiiis an obligate intracellular protozoan parasite of the phylum Apicomplexa, and toxoplasmosis is an important disease of both humans and economically important animals. With a limited array of drugs available there is a need to identify new therapeutic compounds. Aureobasidin A (AbA) is an antifungal that targets the essential inositol phosphorylceramide (IPC, sphingolipid) synthase in pathogenic fungi. This natural cyclic depsipeptide also inhibitsToxoplasmaproliforation, with the protozoan IPC synthase orthologue proposed as the target. The data presented here show that neither AbA nor an analogue (Compound 20), target the protozoan IPC synthase orthologue or total parasite sphingol

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (2)
Crossref