Objective(s): The study aims to assess the early detection of early detection of first degree relatives to type-II
diabetes mellitus throughout the diagnostic tests of Glycated Hemoglobin A1C. (HgbA1C), Oral Glucose Tolerance
Test (OGTT) and to find out the relationship between demographic data and early detection of first degree
relatives to type-II diabetes mellitus.
Methodology: A purposive "non-probability" sample of (200) subjects first degree relatives to type-II diabetes
mellitus was selected from National Center for Diabetes Mellitus/Al-Mustansria University and Specialist Center
for Diabetes Mellitus and Endocrine Diseases/Al-kindy. These related persons have presented the age of (40-70)
years old. A questionnaire was constructed for the purpose of the study, it is composed of (3) major parts, and
overall items, which are included in the questionnaire are (76) items. Reliability and validity of the questionnaire
were determined through a pilot study which is carried out during the period of August, 1
st
, 2008 to February, 30th
2009. The study instrument and structured interview technique were used as means of data collection. The data
were analyzed through the application of the descriptive statistical data analysis approach (Frequency and
Percentage) and the inferential statistical data analysis approach Chi-square, Pearson correlation coefficient.
Results: The results of the study confirmed that the mean of age is (55.7) year, and the majority of the sample are
male, first degree relatives with diabetes mellitus type-II are within positive bio-social aspect and laboratory
screening had an effect on the incidence of diabetes mellitus type-II for first degree relatives to type-II diabetes
mellitus.
Recommendations: The study recommends that the number of diabetes centers should be increased in Baghdad
and Governorates, promote of HbA1c test from general hospitals laboratories, guide notebook about the
predisposing factors of diabetes mellitus in his family, periodic screening for pre-diabetes and diabetes in high risk,
asymptomatic, undiagnosed adults within the health care setting, prevention program to prevent and control on
the predisposing risk factors for nondependent diabetes mellitus type-II and complication
The current study presents the cellar spiders genus Nita Huber & El-Hennawy, 2007 (Araneae, Pholcidae) as the first record for Iraq spider fauna, this genus represented by the species Nita elsaff Huber & El-Hennawy, 2007 were identified based on morphological characteristics and DNA sequence data. A short morphological description is also presented for cellar spiders listed in Iraq; including this species in addition to Artema Atlanta Walckenaer, 1837.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac
So far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreDiabetic kidney disease is an illness of the glomerulus that interferes with the glomerular filtration barrier (GFB), which is worked to enable kidney to selective purification of water and solutes in addition to limiting the movement of large macromolecules such as albumin. In the glomerular endothelium, mesangial cells, foot cells, and the brush border of the proximal tubules, ACE-2 is expressed and that the kidneys represent the highest-expressing region of this enzyme. Thus, the current study aimed to evaluate ACE-2 level in this case compared to healthy condition. The study Conducted with 120 male and female ranging in age (30-65) years old. Ninety patients with type 2 diabetes subdivided into three groups on the basis of A
... Show MoreBackground: The problem of difficult gallbladder is not clearly defined and associated with real missing of therapeutic approaches that decreased morbidity. Moreover, the difficult gallbladder was reported as a contributing risk factor for biliary injury due to raised difficulty in surgical dissection within Calot’s triangle. The aim of this study is to determine the surgical outcomes of the open fundus-first cholecystectomy in lowering the rate of lethal intraoperative risks.
Subjects and Methods: Our prospective study conducted during the period of January 2019 to December 2022 at Ibn Sina specialized hospital, Khartoum, Sudan, for two hundred and fifty-three patients underw
... Show MoreRecent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show MoreThis paper depends on sheding some litgt on the characteristics of political
relations between the arab and the Persian during the reign of sassane kings.
"Ardashir the first, shahbour the first, shahbour the second, Bahram the fifth; kisra
Anushrwan and kisrah abruis"
And who rulled the Persian before the Islamic conquest and were adopted in this studym
as a model. It was possible to get some information from invaluable refereces in order to
arrive at a clear image as regards the nature of these relations. These relations were
differently political according to the circumstances of ruling, interests and the personality
of those kings.