Pituitary adenomas are the anterior pituitary tumors. Patients with an Aryl Hydrocarbon Receptor-Interacting Protein (AIP) mutation (AIP- mut) tend to have more aggressive tumors occurring at a younger age. Single nucleotide polymorphisms (SNPs) in many studies have been related to metabolic comorbidities in the general population. Study aims investigated the role of AIP gene SNPs with susceptibility to acromegaly pituitary- adenoma, with levels of LH, FSH, TSH, Testosterone, IGF1,GH, FT4 , Prolactin hormones and blood sugar levels. The study was conducted on a group of acromegaly patients, including 50 patients) both Genders( with hyperplasia of the ends, and apparently healthy control group. Genotyping of AIP gene SNP (rs641081C >A) was indicated significant differences in frequency percentage between the study groups. The frequency of heterozygous CA genotype was significantly (p<0.01) higher in the patients' group when compared with control. The Means of IGF1, GH, prolactin, testosterone, and FBS were significantly higher in patients at first treatment than that in control. While, the means of IGF1, GH, prolactin, and testosterone increased significantly in patients at last treatment than control. Patients mean level of TSH decreased significantly at last treatment. No significant differences (P ≥ 0.05) were detected between study groups in all other values. The Means of IGF1, GH, and prolactin at first and last treatment were significantly decreased, while LH was significantly increased at last treatment. In patients with heterozygous mutant and wild genotype, means of IGF1, GH, and prolactin decreased significantly at last treatment compared to first treatment. In this study heterozygous rs641081C>A showed a risk factor for susceptibility of acromegaly. Also, serum IGF1, GH, prolactin, were affected by the SNP of AIP gene within carriers of genotypes of rs641081C>A. IGF1, prolactin and GH decreased significantly at last treatment compared to first treatment.
This study examines the effect of colonialism on Caribbean society during the colonial period. Through normalization, the British colonial power diminished Caribbean identity and planted a new hybrid identity. Discipline institutions and surveillance techniques had a vital role in normalizing Caribbean society. Caribbean authors have adopted this notion of normalization to represent the reality of colonialism and its consequences. George Lamming, one of the Caribbean political activist and influential novelist in his novel In the Castle of My Skin (1953), reflects normalization as theorized by Michael Foucault. Lamming depicts the story of villagers and their life under colonial domination. Through discipline institution, like school, colo
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe aim of this study is for testing the applicability of Ramamoorthy and Murphy method for identification of predominant pore fluid type, in Middle Eastern carbonate reservoir, by analyzing the dynamic elastic properties derived from the sonic log. and involving the results of Souder, for testing the same method in chalk reservoir in the North Sea region. Mishrif formation in Garraf oilfield in southern Iraq was handled in this study, utilizing a slightly-deviated well data, these data include open-hole full-set logs, where, the sonic log composed of shear and compression modes, and geologic description to check the results. The Geolog software is used to make the conventional interpretation of porosity, lithology, and saturation. Also,
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1