Preferred Language
Articles
/
ijs-3748
Effects of Lipid Peroxidation, Thyroid Hormones, and Some Vitamins in Type 2 Diabetic Patients
...Show More Authors

   One of the most common forms of diabetes is Type-2 that occurs due to the failure of cells in recognizing and responding to insulin if not accurately treated. The aim of this work is to evaluate the relations of thyroid hormones, vitamins, and lipid peroxidation with the glycemic index in patients experiencing Type-2 diabetes. Some tests of biochemical parameters and vitamins were conducted on 35 patients experiencing Diabetes Mellitus (DM) and 35 healthy subjects. The results indicated the increase in the levels of MDA (3.86 ± 0.97 µmol/L), HbA1c (8.27 ± 1.66 %), FBS (198.34 ± 32.41 mg/dl) and TSH (5.67 ±0.34 mIU/L) in the blood of diabetic subjects in comparison to the controls at a P value lower than 0.05. These increases resulted in decreasing the levels of GSH (3.68 ± 1.21 µM/mL), T3 (0.91 ± 0.03 ng/ml), vitamin E (0.66 ± 0.15 mg/dl), T4 (3.67 ± 0.46 µg/dl), and vitamin D3 (16.78 ± 4.32 mg/L) in diabetic subjects at the same P value. The present study concludes that there is relationship between thyroid hormones and oxidative stress in type 2 diabetes mellitus. In addition, there is a negative correlation between the levels of vitamin E, D, and HbA1c. Therefore, diabetics should monitor their levels of thyroid hormones and vitamins E and D.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Study on Aeromonas spp. Isolated from raw and drinking water in Baghdad city
...Show More Authors

Atotal of 551 water samples drinking( five Water Treatment Plans (WTPs) and raw water( from different sites on Tigris river) were collected.According to morphological characteristics and a set of biochemical tests, one hundred twenty eight of Aeromonas spp isolates were obtained In this study The percentages of Aeromonas recovery from river water was 72.52%, from wells water was (35%).Total percentage of positive aeromonas samples of treated water(Filtration &chlorine tank, supply water of WTPs, distribution system, reserviores and other samples not related to WPTs) was 8.8%.Count of Aeromonas in positive aeromonas samples ranging from 1 to 175 cfu 100 ml.
The results showed that generally no significant correlation between presen

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Journal Of The Faculty Of Medical Baghdad
Comparative study between ultrasound findings and intra-operative in non-traumatic abdominal pain
...Show More Authors

Publication Date
Fri Jan 01 2010
Journal Name
Al Adab Journel
Gender Struggle and Women's Predicament in Tennessee Williams' A Street Car named Desire
...Show More Authors

Abstract The aim of this paper is to shed light on the theme of Gender Struggle and Women’s Predicament in Tennessee Williams’ A Street Car Named Desire .The paper tries to show William's dealings with the critical social themes like Men's Brutality and women's predicament. The paper exposes the complete shift of the balance of power between the genders in America after the two world wars. Williams illustrates society’s changing attitudes towards masculinity and denounces the society's attitudes towards women in America at that time. He rebels against the cruelty of the modern age and regrets the disintegration of the values of the south and their being replaced by the disruptive forces of modern life. In the end of the play, brutalit

... Show More
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Consistency and Consistency in Contemporary Iraqi Painting - Selected Models-: حسين شاكر قاسم العيداني
...Show More Authors

  The tagged research is concerned with observation and investigating the concepts of consistency and harmony in contemporary Iraqi painting (selected models) in order to reveal the mechanisms and rules of these two concepts in the artistic field and their mechanisms of operation. How reflected tools Consistency and harmony in contemporary Iraqi painting? What is consistency and what are its mechanisms and principles? Is consistency a unit product quality? Are there similarities between consistency and harmony? What is harmony and its principles and rules? As for the second chapter, it included two topics that dealt with the first topic - consistency and harmony between concept and significance, while the second topic meant - histor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Cooling and Heating a Greenhouse in Baghdad by a Solar Assisted Desiccant System
...Show More Authors

Modeling the microclimate of a greenhouse located in Baghdad under its weather conditions to calculate the heating and cooling loads by computer simulation. Solar collectors with a V-corrugated absorber plate and an auxiliary heat source were used as a heating system. A rotary silica gel desiccant dehumidifier, a sensible heat exchanger, and an evaporative cooler were added to the collectors to form an open-cycle solar assisted desiccant cooling system. A dynamic model was adopted to predict the inside air and the soil surface temperatures of the greenhouse. These temperatures are used to predict the greenhouse heating and cooling loads through an energy balance method which takes into account the soil heat gain. This is not included in

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Experimental Parasitology
An Acanthamoeba castellanii metacaspase associates with the contractile vacuole and functions in osmoregulation
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Indian Academy Of Oral Medicine And Radiology
Salivary biomarkers (Vitamin D, Calcium, and Estrogen Hormone) in postmenopausal women with osteoporosis
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Political Sciences Journal
Using the Nudge Theory in Improving Security Policies and Crime Prevention: Integrative Review
...Show More Authors

The "Nudge" Theory is considered one of the most recent theories, which is clear in the economic, health, and educational sectors, due to the intensity of studies on it and its applications, but it has not yet been included in crime prevention studies. The use of  Nudge theory appears to enrich the theory in the field of crime prevention, and to provide modern, effective, and implementable mechanisms.

The study deals with the "integrative review" approach, which is a distinctive form of research that generates new knowledge on a topic through reviewing, criticizing, and synthesizing representative literature on the topic in an integrated manner so that new frameworks and perspectives are created around it.

The study is bas

... Show More
View Publication Preview PDF
Crossref