Preferred Language
Articles
/
bsj-2070
Serum Vascular Endothelial Growth Factor VEGF and Interlukin-8 As a Novel Biomarkers For Early Detection of Ovarian Tumors
...Show More Authors

Epithelial ovarian cancer is the leading cause of cancer deaths from gynecological malignancies. Angiogenesis is considered essential for tumor growth and the development of metastases. VEGF and IL?8 are potent angiostimulatory molecules and their expression has been demonstrated in many solid tumors, including ovarian cancer.VEGF and IL-8 concentrations were measured by ELISA test (HumanVEGF,IL-8). Bioassay ELISA/ US Biological / USA).The median VEGF and IL-8 levels were significantly higher in the sera of ovarian cancer patients than in those with benign tumors and in healthy controls.Pretreatment VEGF and IL-8 serum levels might be regarded as an additional tool in the differentiation of ovarian tumors.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 13 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of Periodontal Therapy on Serum and Salivary Interleukin-2 Levels in Chronic Periodontitis
...Show More Authors

Background: Interleukine-2 is a multifunctional cytokine, considered a central regulator of host resistance against a variety of pathogens and has been recently demonstrated to exert an active role in the pathogenesis of periodontal diseases. The purpose of this study was to evaluate the effect of scaling and root planning on level of IL-2 in serum and saliva of patients with chronic generalized periodontitis, in relation to clinical parameters. Materials and Methods: A total of 50 subjects were enrolled, of which 25 had chronic generalized periodontitis and 25 periodontally healthy subjects as control. The clinical parameters included: gingival index, pocket probing depth, clinical attachment level and bleeding on probing. The level of

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
T-Cells Proliferation and Serum Cytokine levels in Type 1 Diabetic Children
...Show More Authors

Background: There is plenty of evidence
suggesting that involvement of several groups of
viruses in the development and / or acceleration of
Type 1 Diabetes Mellitus (T1DM).
Objective: To analyze the T- cell proliferation in
the presence of Coxsackie virus B5 (CVB5), Polio
and Adenovirus antigens in addition to assessment
of Interferon- gamma (IFN-γ), Interleukins (IL-10
and IL-6).
Methods: In 60 Iraqi T1DM children with recent
onset of T1DM, Lymphocyte proliferation was
analyzed using Methylthiazol tetrazolium (MTT)
assay by culturing Peripheral Blood Lymphocytes
(PBLs) with Coxsackie Virus B5 (CVB5),
Adenovirus, and Polio vaccine. Serum Interferon-γ,
IL-10 and IL-6 were quantified by sandw

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Biochemical and Kinetic Study on Serum Adenosine Deaminase Enzyme in P­ Thalassaemia
...Show More Authors

This study was conducted to investigate activity and some kinetic

and  thermodynamic  parameters  of  adenosine  deaminnse  (ADA)in

serum in patient affected with P-thalassaemia and compared with that of   healthy   individuals    .Serum   AD   levels   were   found   to   be significantly  higher  in  patient  with  P-thalassaemia  (98±9.15  IU/L) than in healthy  individuals (22± 2.04 IUIL)the study was carried in optimum pH value 6.5 and 37c  by which the enzyme possess highest activity .The study was concentrated to comprehensive  determina

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 15 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences
Novel Candidate Single Nucleotide Polymorphisms of ERCC2 Gene that Influence Colorectal Cancer Susceptibility
...Show More Authors

Colorectal cancer (CRC) is the most common gastrointestinal malignancy and one of the top ten common cancers worldwide with approximately 2 million cases. There are multiple risk factors that could lead to CRC emergence; of which are genetic polymorphisms. Excision repair cross-complementing group 2 (ERCC2) gene encodes for ERCC2 enzyme which plays a crucial role in maintaining genomic integrity by removing DNA adducts. Several studies suggested that there could be a link between genetic polymorphisms of ERCC2 gene and the risk of CRC development. Hence the present study aims to validate the relationship between the following ERCC2 single nucleotide polymorphisms (rs13181, rs149943175, rs530662943, and rs1799790) and CRC susceptibility. A t

... Show More
Preview PDF
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improving Detection Rate of the Network Intrusion Detection System Based on Wrapper Feature Selection Approach
...Show More Authors

Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Detection of Shallow Cavities Using 3D Resistivity Technique in a Small Site Near Haditha City, Western Iraq
...Show More Authors

     Iraqi western desert is characterized by a widespread karst phenomenon and caves. Euphrates formation (Lower Miocene) includes enormous sinkholes and cavities within carbonate rocks that usually cause severe damages to any kind of engineering facilities built over it. 3D resistivity imaging techniques were used in detecting this kind of cavities in complicated lithology. The 3D view was fulfilled by collating seven 2D imaging lines. The 2D imaging survey was carried out by Dipole-dipole array with (n) factor and electrode spacing (a) of 6 and 2m respectively. The horizontal slices of the 3D models give a good subsurface picture. There are many caves in all directions (x, y, z). They reveal many small caves near the surface. Thes

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Mon Apr 23 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Detection of tox A gene in Pseudomonas aeruginosa that isolates from different clinical cases by using PCR.
...Show More Authors

       Current study obtained (75) isolate of Pseudomonas aeruginosa collected from different cases included : 28 isolates from otitis media, 23 isolates from burn infections, 10 isolates from wound infections, 8 isolates from urinary tract infections and 6 isolates from blood, during the period between 1/9/2014 to 1/11/2014

       The result revealed that the tox A gene was present in 54 isolates (72%) of Pseudomonas aeruginosa. The gel electrophoresis showed that the molecular weight of tox A gene was 352 bp. The result shows 17 isolates (60.71%) from otitis media has tox A gene, 1

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 02 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
The Making of a Heroine: A Female Character as Portrayed in The English Patient By Michael OndaatjE
...Show More Authors

This article discusses how women have significant abilities to cope with the difficulties of war times. They are not the weak and vulnerable victims who are thought to be. On the contrary, they have the power to control over many-sided fronts, like participating in the battlefield as nurses or activists for peace, or even fighters, as well as through the tasks and responsibilities assigned to them to protect and support their families during wartime. The researcher will examine the impact of war upon women. Like men, women suffer during wartime. They are being injured, tortured and killed. Yet, they are able to give examples of love and courage even in the difficult times of war. Hana is one of those women who lived during wartimes,

... Show More
View Publication
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Ideological Polarization as a Deception Strategy in the Discourse of American Think Tanks: A Critical Discourse Analysis
...Show More Authors

Deception is an inseparable facet of political discourse in attaining strategic political gains though compromising public opinion. However, the employment of discursive deception strategies by the policy-making institutions of think tanks has not received due attention in the literature. The current study aims at exploring how the ideologizing deception strategies are utilized by the conservative American think tank of the Washington Institute to reproduce socio-political realities and re-shape public opinion. To fulfill this task, van Dijk’s (2000) notion of ideological polarization which shows positive self-representation and negative other representation is adopted to conduct a critical discourse analysis of four Arabic texts relea

... Show More
View Publication Preview PDF
Crossref (1)
Crossref