Preferred Language
Articles
/
cxYvjIsBVTCNdQwCUs1P
The Role of Monoamine Oxidase and Atherogenic Index in Newly Diagnosed and Tamoxifen Treated Women with Breast Cancer Disease
...Show More Authors

Breast cancer (BC) is one of the most frequently observed malignancy in females worldwide. Today, tamoxifen (TAM) is considered as the highly effective therapy for treatment of breast tumors. Oxidative stress has implicated strongly in the pathophysiology of malignancies. This study aimed to investigate the changes in the levels of oxidants and antioxidants in patients with newly diagnosed and TAM-treated BC. Sixty newly diagnosed and 60 TAM-treated women with BC and 50 healthy volunteers were included in this study. Parameters including total oxidant capacity (TOC), total antioxidant capacity (TAC), and catalase (CAT) activity were determined before and after treatment with TAM. The serum levels of TOC and oxidative stress index (OSI) were elevated significantly (P<0.001) in newly diagnosed BC patients compared with control, while the level of TAC and CAT activity were observed to be statistically declined (P<0.001). Furthermore, the BC patients on TAM treatment have shown highly significant levels of serum TOC (P<0.05) and TAC (P<0.001) with a significant reduction (P<0.001) in CAT activity compared with control. In TAM-treated patients compared with newly diagnosed BC patients, the TOC level was decreased, the TAC level was increased, the OSI level was decreased and the CAT activity was decreased. The results indicate a strong and aggressive association between oxidative stress and the first onset of BC, as well as the tendency of TAM drug to improve the levels of TOC, TAC, and OSI in BC patients, but it had a reduction influence on CAT activity.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Biofilm formation rate measurement in water and biomedical systems using photometric smartphones applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jul 05 2025
Journal Name
Journal Of Machine And Computing
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Mar 28 2022
Journal Name
Nurse Media Journal Of Nursing
Health Literacy-Related Knowledge and Experience among Nurses Practicing in Medical-Surgical Wards
...Show More Authors

Background: Medical-surgical nurses are responsible of providing competent care to clients with a wide-array of acute and chronic health problems. This challenging task requires arming nurses with advanced competencies of health literacy to effectively educate their clients. However, evidence about medical-surgical nurse’s health literacy-related knowledge and experience is limited.  Purposes: This study aimed to determine the level of the health literacy-related knowledge and experience among medical-surgical nurses.Design: A descriptive-cross-sectional study was conducted among a total sample of 177 nurses who were practicing in medical-surgical wards in teaching hospitals in Iraq. A convenience sampling method was used to sele

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Thu Nov 17 2022
Journal Name
مجلة الدراسات الدولية
Iraq's strategic performance in achieving sustainable development after 2005: challenges and coping strategies
...Show More Authors

The research discusses the obstacles that faced the Iraqi strategic performance in achieving sustainable development after the election of the first Iraqi government in 2005 and the most important strategies to overcome these obstacles.

View Publication
Publication Date
Sat Mar 07 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Oral manifestations, microbial study and salivary IgA study in asthmatic patients receiving prednisolone
...Show More Authors

Background: Asthma is a disease of the airways characterized by chronic inflammation associated with airway hyper-responsiveness and airway wall remodeling. Aims of the study: The aims of this study was to determine the prevalence of oral manifestations , identify different microorganism from oral micro flora and determination of salivary IgA and salivary flow rate in asthmatic patients taking different dose of Prednisolone in comparison with control group. Subjects, materials and methods: The study included 17 patients under treatment with Prednisolone (10-20 mg),15 patients take (20-30 mg) of Prednisolone and other 18 patients take (30 – 40mg) of Prednisolone, and 25 healthy control group (10 male and 15 female). Results : The mo

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Harnessing Technological Innovation and Artificial Intelligence in Iraqi Commercial Banks to Achieve Sustainability
...Show More Authors

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
ESO-based repetitive control for rejecting periodic and aperiodic disturbances in piezoelectric actuators
...Show More Authors

This paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Glob. J. Mol. Evol. Genom
Genetic diversity and relationships among Verbascum species in Iraq by RAPD-PCR technique
...Show More Authors