Preferred Language
Articles
/
ijs-8412
Human β-Defensin 2 as a Novel Diagnostic Marker of Iraqi Patients with Rheumatoid Arthritis
...Show More Authors

Rheumatoid arthritis (RA) is an autoimmune disorder of the joints that is characterized by extra-articular involvement in addition to inflammatory arthritis. Joint and periarticular tissue loss brought on by inflammation results in functional impairment. To lessen the significant daily challenges that patients confront and to ensure better outcomes, early detection and treatment are essential. The study's objective was to establish the use of human β-defensin-2 (HBD-2) as a RA diagnostic marker. A total of 60 RA patients and 30 healthy controls participated in the research. The ELISA technique was used to measure serum HBD-2. The following tests were performed: complete blood count (CBC), erythrocyte sedimentation rate (ESR), renal function test, and liver function test. In comparison to the healthy control group, the RA group exhibited a substantially higher blood HBD-2 levels (p ≤0.001). Additionally, there was no significant association between serum HBD-2 and urea, creatinine, AST, ALT, and ESR (P>0.05). When RA was distinguished from the group of healthy individuals, the area under the curve (AUC) demonstrated excellent diagnostic accuracy (AUC = 0.990, p = 0.001). (0.9667). As a result, serum HBD-2 may be used as a reliable RA diagnostic marker.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Al-adab Journal
Anglicism as a source of language neologization
...Show More Authors

Одной из активно развивающихся отраслей лексикологии является неология, объект её изучения - новое слово или неологизм. В задачу неологии входит выявление новых слов и новых значений у уже существующих в языке слов, анализ причин и способов их появления, описание факторов, влияющих на появление нового в лексической системе языка, разработка языковой политики в отношении новых номинаций.  Лексикограф

... Show More
View Publication
Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Gender Distribution of Coronary Artery Calcium Score and Degree of Stenosis Assessed by Computed Tomography Angiography in Iraqi Patients with Chest Pain
...Show More Authors

Background: Sex variations in coronary artery disease (CAD) are well documented. However, sex differences in coronary artery calcium (CAC) and its role in the detection of coronary artery stenosis remain controversial. Objective: To assess the impact of sex variation on coronary artery calcification and its efficacy in predicting coronary artery stenosis. Methods: This is a cross-sectional observational study including 230 consecutive patients with suspected CAD (120 men and 110 women) referred for coronary computed tomography angiography (CCTA). The study analyzed sex-based differences in the sensitivity and specificity of coronary artery calcification (CAC) for detecting moderate to severe stenosis across various coronary arteries

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Development and Characterization of Controlled Release Tablets of Candesartan Cilexetil/ β‑Cyclodextrin Inclusion Complex
...Show More Authors

Objective: Matrix tablet approach is one of the delivery systems intended for poorly water-soluble drugs, like candesartan cilexetil (CC). CC is a class II drug used for the treatment of hypertension. Methods: Matrix tablets from (F1x to F18z) were prepared in the presence of β‑cyclodextrin. Matrix tablet formulation ensures control release of the drug and higher dissolution by β‑cyclodextrin. Fourier transform infrared spectroscopy (FTIR), and differential scanning calorimetry (DSC) were used to study compatibility. Results: The angle of repose determination showed good flow for most of the formulas, besides having good compressibility. Weight variation test for all formulas showed accepted value. Drug content measurement sho

... Show More
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Development and Characterization of Controlled Release Tablets of Candesartan Cilexetil/ β‑Cyclodextrin Inclusion Complex
...Show More Authors

Objective: Matrix tablet approach is one of the delivery systems intended for poorly water-soluble drugs, like candesartan cilexetil (CC). CC is a class II drug used for the treatment of hypertension. Methods: Matrix tablets from (F1x to F18z) were prepared in the presence of β‑cyclodextrin. Matrix tablet formulation ensures control release of the drug and higher dissolution by β‑cyclodextrin. Fourier transform infrared spectroscopy (FTIR), and differential scanning calorimetry (DSC) were used to study compatibility. Results: The angle of repose determination showed good flow for most of the formulas, besides having good compressibility. Weight variation test for all formulas showed accepted value. Drug content measurement sho

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Favorite TV Channels / as News Sources for Iraqi University Professors.
...Show More Authors

The growing ability of Television to transfer and present events as they occur and sometimes transfer events alive makes it the most important sources to receive news and find out what is going on in the world. These channels form the importance of multiple sources and displayed content, especially news. What adds to the importance of the research is that the people under study are Iraqi professors
The problem of the study is represented by an essential inquiry about the favorite satellite channels to obtain news for Iraqi professors
The aims of the study are identified by finding out the most favorite satellite channels as a source of news for Iraqi professors and the habits of exposer to the news by them
The research is a des

... Show More
View Publication
Crossref
Publication Date
Fri May 01 2015
Journal Name
Ieee Transactions On Microwave Theory And Techniques
On the Design of Gyroelectric Resonators and Circulators Using a Magnetically Biased 2-D Electron Gas (2-DEG)
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref