Obesity is an escalating health problem in developing countries. One to ten children worldwide are overweight in a report showed by the International Obesity Task Force. Ghrelin, orexigenic peptide, has 28 amino acids, it is considered the greatest remarkable promotion in the last two decades for understanding the physiological changes of action regulating food intake and hunger. Obestatin is a 23-amino acid peptide nearly connected to ghrelin that secures from substitution splicing the alike resort molecule, pre-proghrelin. The study is designed to assess the level of ghrelin and obestatin in Iraqi obese children and its relation with other biochemical parameters. Ghrelin and obeststin levels were measured in sixty obese children; the range of their age was (5-16) years, and this group was compared to 30 children in a healthy state as a control. Serum FBS, PPBS, and also lipid profiles (TG, TC, HDL-c, and LDL-c) were determined in the studied groups. Calculation of insulin resistance was done by using (HOMA-IR) a Homeostasis Model assessment of insulin resistance. Ghrelin levels were lower in a significant way in subjects who have obesity in comparison with control group. Significantly, there was a high increase in obestatin in obese patients when compared with control. This study demonstrates that obestatin raises and ghrelin is low in obesity, these hormones are related to the resistance of insulin, and there is an association between ghrelin and oxidative stress. The scales between obestatin and ghrelin are likely disturbed in obesity.
The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show MoreThe research aims to determine the impact of Human Resources Accounting (HRA) on employee’s performance. The research’s problem was embodied in the lack of interest in HRA, which was reflected on the performance of employees in the Ministry of Education; the research adopted the descriptive-analytical approach, and the research community included the directors of departments and people at the headquarters of the Ministry of Education. The sample size was (224) individuals from the total community of 533. The questionnaire was adopted as the main tool for collecting data and information, as well as the interviews that were conducted by the researcher. In order to analyze t
... Show MoreThe aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the
... Show MoreNowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreBackground: Odontogenic cysts include a group of osseodestructive lesions that frequently affect the jaws. Those cysts could derive from odontogenic epithelium and occur in the tooth-bearing regions of the jaws. The aims of this study were to evaluate the immunohistochemical expression of Cyclin D1 in Keratocystic Odontogenic Tumor, Dentigerous cyst and Radicular cyst in epithelium and connective tissue capsule. Materials and Methods: In this study, thirty formalin fixed paraffin embedded tissue blocks of Odontogenic cysts and Tumor, consist of 14 Keratocystic Odontogenic Tumor, 8 dentigerous cysts and 8 radicular cysts were analyzed immunohistochemically for the presence of Cyclin D1 proteins. Results: Strong to moderate expression of Cy
... Show More
