Preferred Language
Articles
/
ijs-2671
Prevalence Rate and Correlation Between Triglyceride Level and Human Body Mass Index in Sulaimani Province, Iraq
...Show More Authors

The condition of elevated concentrations of triglyceride in the blood is called hypertriglyceridemia, which triggers the onset of some physiological disorder. This study was carried out to find the correlation between body weight and hypertriglyceridemia. Out of 518 cases, 342 individuals were underweight, with body mass index (BMI) values of ≤18, while their mean serum triglyceride level was 172.4 ± 25.2mg/dl. In addition, 99 cases had normal BMI of >18, whereas 60 were overweight (BMI = 25-29), with mean serum triglyceride level of 182.3 ± 15.9. Also, 17 cases were obese (BMI >30), where the mean triglyceride level was 202 ± 25.6. The results showed no significant differences in terms of weight categories and triglyceride levels, whereas significant effects of marital status, daily exercise, and diet on elevated triglyceride levels were observed. These findings conclude that underweight and normal BMI individuals were as much at risk of elevated level of triglyceride as overweight and obese ones, which are mostly at higher risk. Moreover, daily exercise and supplementary nutrient have significant effects on triglyceride level.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Polymers And Polymer Composites
Preparation and characterization of silver self-metallization on polyimide
...Show More Authors

In this work, silver (Ag) self-metallization on a polyimide (PI) film was prepared through autocatalytic plating. PI films were prepared through the solution casting method, followed by etching with potassium hydroxide (KOH) solution, sensitization with tin chloride (SnCl2), and the use of palladium chloride (PdCl2) to activate the surface of PI. Energy-dispersive X-ray analysis (EDX) showed the highest peak in the (Ag) region and confirmed the presence of AgNPs. The diffraction peaks at 2θ = 38.2°, 44.5°, 64.6°, and 78.2° represented the 111, 200, 220, and 311 planes of Ag, respectively. The FT–IR an

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Wavelet and Forecasting Wind Speed with Application
...Show More Authors

Time series analysis is the statistical approach used to analyze a series of data. Time series is the most popular statistical method for forecasting, which is widely used in several statistical and economic applications. The wavelet transform is a powerful mathematical technique that converts an analyzed signal into a time-frequency representation. The wavelet transform method provides signal information in both the time domain and frequency domain. The aims of this study are to propose a wavelet function by derivation of a quotient from two different Fibonacci coefficient polynomials, as well as a comparison between ARIMA and wavelet-ARIMA. The time series data for daily wind speed is used for this study. From the obtained results, the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Operations Rescheduling Strategies, Policies, and Methods: A Philosophic Approach
...Show More Authors

When scheduling rules become incapable to tackle the presence of a variety of unexpected disruptions frequently occurred in manufacturing systems,  it is necessary to develop a reactive schedule which can absorb the effects of such disruptions. Such responding requires efficient strategies, policies, and methods to controlling production & maintaining high shop performance. This can be achieved through rescheduling task which defined as an essential operating function to efficiently tackle and response to uncertainties and unexpected events. The framework proposed in this study consists of rescheduling approaches, strategies, policies, and techniques, which represents a guideline for most manufacturing companies operatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Gelatin Grafted Methyl Nadic Anhydride and Substitution With Salbutamol
...Show More Authors

Gelatin a promising biomaterial which is useful and interesting natural polymer which offer possibilities of chemical modification through grafted copolymerization with an saturated acid anhydride such as methyl nadic anhydride formatted gelatin –g- methyl nadic anhydride copolymer (A1), then modified to its corresponding polymer (A2) by substituted salbutamol as useful derivative as biomaterial .the prepared drug biopolymer was characterization by FTIR spectroscopy and thermal analysis was studied controlled drug release was measured in different buffer solution at 37C0 .

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Contemporary Sculpture vision and concept: محمد عبد الحسين يوسف
...Show More Authors

The research is divided into three chapters, the first of them to the research problem and its importance and its purpose and its limits, while the second chapter review of contemporary sculpture as a vision and concept, The third chapter came to view the most important results reached by the search.

 

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proteoytic Activity and Swarming Growth of Proteus spp. Isolates.
...Show More Authors

Many clinical isolates of proteus spp. (30 isolates of P
mirabilis and 30 isolates of P. vulgaris) from patients with urinary
tract infections (UTIs) were examined for their ability to produce
proteolytic enzymes and their ability to form swarming growth. Most
(90%) of P. mirabilis and 60% of P. vulgaris isolates secreta
proteolytic enzymes. A strong correlation was found between the
ability of a strain to secreted proteases and it's ability to form
swarming growth. Non- swarming isolates invariably appeared to be
non- proteolytic. However, some isolates (12 isolates of P. vagaries)
were non- proteolytic even when they formed swarming growth

View Publication Preview PDF
Publication Date
Sat Oct 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
Illation for the Groups SL(2,112 ) and SL(2,132 )
...Show More Authors

Publication Date
Thu Aug 03 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Category Theory and New Classes of Semi Bornological Group
...Show More Authors

Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref