This work aims to detect the associations of C-peptide and the homeostasis model assessment of beta-cells function (HOMA2-B%) with inflammatory biomarkers in pregnant-women in comparison with non-pregnant women. Sera of 28 normal pregnant women at late pregnancy versus 27 matched age non-pregnant women (control), were used to estimate C-peptide, triiodothyronine (T3), and thyroxin (T4) by Enzyme-linked-immunosorbent assay (ELISA), fasting blood sugar (FBS) by automatic analyzer Biolis 24i, hematology-tests by hematology analyzer and the calculation of HOMA2-B% and homeostasis model assessment of insulin sensitivity (HOMA2-S%) by using C-peptide values instead of insulin. The comparisons, correlations, regression analysis tests were performed by the software of statistical package for the social sciences (SPSS). In pregnant women group, HOMA2-B%, T3, T4, white blood cell (WBC), MID cells, granulocytes (GRAN) increased significantly (p-values˂0.05), while C-peptide level raised about 11% compared to control. Lymphocytes, red blood cells (RBC), platelets (PLT) and hemoglobin (HGB) decreased significantly (p-values˂0.05). Lymphocytes predicted both HOMA2-B% and C-peptide level during pregnancy (R2 =0.516, p ˂0.0004; R2=0.31, p ˂0.009 respectively). Prediction of HOMA2-B% and C-peptide levels by lymphocytes account clarifies that the adaptation in beta-cells might be a part of the defense system mechanism of the body against oxidative stress, and this highlights new insight on the proliferation of beta-cells during pregnancy and insulin sensitivity.
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show Moreيشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا
... Show MoreThis study we have made a subject of fanny podcast in electronic media, as a new way to express different issues by the public, This study focuses started on how to address social issues in Alegria by ANAS TINA vidéo on the youtube network , you are to know the trends of young amateur about the various issues dealt with as well as the most important methods used to convince browsers.
The researcher used the survey method based on studying 10 episodes videos of blogger ANAS TINA.
The result of the study found that the most important issues are the abduction of children, teaching in Algeria; women in Algeria, The negative aspects of the issues addressed have been established in order to direct public opinion and awareness of ph
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show More