Coronary artery disease (CAD) is a major health concern and leading of death in individuals with type 2 diabetes mellitus (T2DM). Glutathione S – Transferase(GST) are known for their broad range of detoxification and in the metabolism of xenobiotics . The role of functional variants of these genes in the development of various disorder is proven. We investigated the possible role of these variants in the development of CAD in T2DM patients. In this case – control study a total of 60 patients (T2DM = 30 ; T2DM – CAD = 30) and 30 controls were included. Serum lipid profiles were measured and DNA was extracted from the blood samples. Multiplex PCR for GSTT1/M1 (present / null) polymorphism, were performed for genotyping of study participants. Gene frequency and lipid profiles were statistically analyzed for disease association. Regression analysis showed that, there was no significant difference of the frequency of GSTT1 (positive /null) genotype and GSTM1 (positive /null) genotype in the 3 study groups . GSTT1 – positive genotype is associated with a 0.51 fold increased ( OR = 0.51 ; 95%CI = 2- 0.1 ;P = 0.321 ) , while the GSTM1 – positive genotype was associated with a 3 fold increase ( OR = 3.06 ; 95%CI=1- 9.7 ; P = 0.055) .We conclude GSTT1 positive genotype considered to be a protective risk from CAD in T2DM patients . The GSTM1 – positive genotype it was considered to be a risk factor of the CAD in T2DM patients.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreBackground: Brush cytology is an accepted technique that gets renewed interest. It is now used as an aid for the diagnosis and observation of possible epithelial changes that could be associated with oral mucosal diseases. This study aimed to evaluate the cytomorphometric changes in gingiva and buccal mucosa of type II diabetics and to assess their relation to oral symptoms and glycemic status. Materials and methods: Cytological Papanicolaou stained smear were prepared from cheek and gingiva of 20 non treated cases, 20 treated diabetics and 20 healthy persons of both sex after measuring their HbA1c and recording their oral symptoms. Hundred unfolded epithelial cells were evaluated qualitatively using MCID software to measure nuclear and cy
... Show MoreThe research tagged with the controversy of aesthetic interpretation between the sculptures and their titles in contemporary Iraqi sculpture, “Exhibition of Experiments in Contemporary Iraqi Sculpture as a Model”, and it is one of the new research that contributes to strengthening the critical path in the Iraqi fine movement, as the first chapter dealt with the research problem stemming from the question: What is the impact of the aesthetic hermeneutic controversy between the title and the title in contemporary Iraqi sculpture?, and do the titles of the sculptural works help to understand or enhance their contents?, The research objective included: To identify the controversy of the aesthetic interpretation of sculptures and their ti
... Show MoreThe paper aims to reveal the effectiveness of digital journalism in developing political awareness among Iraqi feminist activists. This paper is descriptive, and it adopted the analytical descriptive survey method. A snowball sample composed of (102) respondents of Iraqi feminist activists was adopted and questionnaire was used to collect data. The research has reached the following conclusions: The rate of Iraqi Feminist Activists dependence on digital Journalism have increased; to develop their political awareness, and their preference - in this regard - (the pages of journalistic institutions to social media) in a way that exceeds other types of digital journalism. (Variety of languages) has topped the priorities of Iraqi feminist act
... Show More