protein oxidation through oxidative stress, which represents the overall status of the protein in the cell/tissue. Due to their increased levels of AOPPs were reported during T2DM. The aim of this study was to assess AOPP level in T2DM subjects with foot ulcer (DFU) and explore its correlation with infection. Type 2 diabetic patients (n=108) and healthy subjects (n=25) were enrolled in this study. The T2DM group was subdivided to diabetic patients without complications (n=25) and eighty-three (83) of them have diabetic foot. They were sub- grouped into two groups according to presence Osteomyelitis and abscess, and in reliance on medical analysis of WBC count and CRP. Group of diabetic without superficial or deep ulcer and no osteomyelitis or abscess G(0,1,2) (n =45), which consist patients with grades (0,1,2), and group of diabetic with deep ulcer abscess and osteomyelitis G(3,4,5)(n = 38) that consist patients with grade (3,4,5). Twenty- five (25) non-diabetic apparently healthy subjects serve as control (group C) were enrolled. The Biochemical analysis was done for all participants such as serum glucose, hemoglobin A1C, insulin, lipid profile, WBC, and C-reactive protein (CRP). Serum AOPP concentration was determined using an enzyme-linked immunosorbent assay kit. The oxidative status was assessed by measuring catalase activity, glutathione (GSH), malondialdehyde (MDA) and total thiol levels. AOPP, MDA, WBC, and CRP, were significantly higher in G (0,1,2) and G (3,4,5) groups in comparison to control group, while GSH and total thiol levels were significantly lower as compared with control group. The outcomes of this study reveal the incidence of oxidative stress among DFU patients with higher Wagner grades and the presence of relation between inflammation state in DFU subjects and oxidative stress.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBackground: Dental caries is a disease occurs in the world in both developed and developing countries, it is still widespread among children and it can be controlled but not eliminated , most of tooth loss occurs due to dental caries and its complications. The aim of this study was to estimate the occurrence, and severity of dental caries and treatment needs among kindergarten children in Al-Basrah governorate. Materials and methods: The sample consisted of 1000 kindergarten children at age of 4-5 years old (445 boys and 555 girls) from urban areas in Al-Basrah city. Diagnosis and recording of dental caries and treatment needs were done according to the criteria of WHO (1987). Results: The percentage of dental caries was (80.8%) of the tota
... Show MoreB3LYP density functional is utilized for probing the effect of decorating Al, Ga, and In on the sensing performance of a boron phosphide nanotube (BPNT) in detecting the 2-chloroethanol (CHE) molecule. We predict that the interaction of pure BPNT with CHE is physisorption, and the sensing response (SR) of BPNT is approximately 6.3. The adsorption energy of CHE is about − 26.3 to − 91.1, − 96.6, and − 100.3 kJ/mol, when the Al, Ga, and In metals are decorated on the BPNT surface, respectively. This indicates that the decorated metals significantly strength the interaction. Also, the corresponding SR meaningfully rises to 19.4, 41.0, and 93.4, indicating that by increasing the atomic number of metals, the sensitivity i
... Show MoreNowhere is American author Shirley Jackson’s (1916-1965) social and political criticism is so intense than it is in her seminal fictional masterpiece “The Lottery”. Jackson severely denounces injustice through her emphasis on a bizarre social custom in a small American town, in which the winner of the lottery, untraditionally, receives a fatal prize. The readers are left puzzled at the end of the story as Tessie Hutchinson, the unfortunate female winner, is stoned to death by the members of her community, and even by her family. This study aims at investigating the author’s social and political implications that lie behind the story, taking into account the historical era in which the story was published (the aftermath of th
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreAbstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe study aims at identifying the sources of information and explaining their role in e-learning from the viewpoint of the Iraqi college students. The researchers relied on the descriptive method of the survey method to collect data and know the point of view of undergraduate students from the Department of Information in the College of Arts / Tikrit University and the Department of Quranic Studies at the College of Arts / University of Baghdad. The questionnaire was used as an instrument of the study, the research sample is (120) students; each section has (60) male and female students. The study concluded that there are many types and forms of information sources that students receive through electronic educational platforms from text con
... Show More