This study is carried out on patients with type 2 diabetes mellitus to assess the lipid profile, malondialdehyde and glutathione. Our study is concerned with 51 (Iraqi Arab females) patients of type 2 diabetes mellitus compared with 31 control subjects unified in age, sex and ethnic background. Lipid profile is measured by using commercially available kits, while the serum MDA and glutathione levels are measured by means of sandwich ELISA test using commercially available kits. Serum MDA is significantly higher (P<0.001) while glutathione is significantly lower (P<0.001) in type 2 diabetic patients when compared to the control. The normal levels of MDA (3.82 ± 0.77n mol/ml) and GSH (2.23 ± 0.54 µg/ml) recorded for the non-diabetic females are significantly (p<0.001) increased and depleted in the diabetic patients who record (6.78 ± 1.21 n mol/ml) and (1.29 ± 0.23 µg/ml) for MDA, GSH respectively. Parameters of lipid profile were significantly increase (P<0.001), while HDL cholesterol significantly decrease (P<0.001) in patients compared to the control group. The receiver operator curve (ROC) analysis of the forthcoming variations reveale the descending order of serum MDA (0.999), GSH (0.984), HDL (0.817), LDL (0.796), T.C (0.974), TG (0.727) & serum VLDL (0.722) showing a significant variation. In conclusion, the study shows low levels of GSH and high levels of MDA in diabetic patients indicating to an increased oxidative stress which is considered as the main cause to type 2 diabetes mellitus especially obese ones.
Malaysia will be an ageing population by 2030 as the number of those aged 60 years and above has increased drastically from 6.2 percent in 2000 and is expected to reach 13.6 percent by 2030. There are many challenges that will be faced due to the ageing population, one of which is the increasing cost of pensions in the future. In view of that, it is necessary to investigate the effect of actuarial assumptions on pension liabilities under the perspective of ageing. To estimate the pension liabilities, the Projected Unit Credit method is used in the study and commutation functions are employed in the process. Demographic risk and salary risk have been identified as major risks in analyzing pension liabilities in this study. The sensitivity
... Show More
Research summary
Backbiting pronouns have gained great importance in contemporary textual linguistic studies, as they play a coordinating function in the text and link its parts.
Interpreters did not overlook the role of backbiting pronouns in achieving the function of consistency and coherence in the Qur’anic text, as they referred to this, including Ibn Ashour, who had many analytical practices related to referral issues and their complexities. The Qur'anic reference to the pronouns of backbiting, so the researcher traced these phenomena and their evidence in the Holy Qur'an, aiming to clarify their role in enriching the significance and in the coherence and harmony
... Show MoreTicks (Acari: Ixodidae) are ectoparasites that infest livestock in every geographic region of the world and are vectors of several viral, bacterial, and protozoan pathogens to both animals and humans. There is little information is available is about tick presence in Buffalo Bubalus bubalis (Linnaeus, 1758) (Artiodactyla, Bovidae) in Iraq. The current study determined the species of ticks parasitizing Buffalo in some central and southern regions included: Baghdad (Al Fathelia), Karbala (Al-Hussainia), Wasit (Kut and Al-Suwairah), Al-Qadisia (Al- Diwaniyah, Al- Saniya, Al-Mihnawea, and Afak), Thi Qar (Al-Nasiriyah and Al-chibayish), Missan (Amara and Qalaat Salih) and Basrah (Al-Haretha, Al-Madena and Al-Deer). A total of 150 Buffal
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreNumerous regions in the city of Baghdad experience the congestion and traffic problems. Due to the religious and economic significance, Al-Kadhimiya city (inside the metropolitan range of Baghdad) was chosen as study area. The data gathering stage was separated into two branches: the questionnaire method which is utilized to estimate the traffic volumes for the chosen roads and field data collection method which included video recording and manual counting for the volumes entering the selected signal intersections. The stage of analysis and evaluation for the seventeen urban roads, one highway, and three intersections was performed by HCS-2000 software.The presented work plots a system for assessing the level of service
... Show More
Cutting forces are important factors for determining machine serviceability and product quality. Factors such as speed feed, depth of cut and tool noise radius affect on surface roughness and cutting forces in turning operation. The artificial neural network model was used to predict cutting forces with related to inputs including cutting speed (m/min), feed rate (mm/rev), depth of cut (mm) and work piece hardness (Map). The outputs of the ANN model are the machined cutting force parameters, the neural network showed that all (outputs) of all components of the processing force cutting force FT (N), feed force FA (N) and radial force FR (N) perfect accordance with the experimental data. Twenty-five samp
... Show More