Objective: Detection the level of YKL-40 biochemical marker and vitamin D level in sera of Iraqi uterine cancer
females' patients.
Methodology: This study included 90 female volunteers, 30 of them were healthy volunteers who were
considered as a control group, while sixty serum samples were collected from women patients suffering from
uterine tumors (30 malignant and 30 fibroid benign tumors), benign cases were considered as a disease
control group for malignant tumors. The average age of those females was 30-75 years, which matched the
control group. All the samples were collected from Azady hospital in Kirkuk and the gynecologic department at
Medical City in Baghdad during October /2012 to May /2013. All the serum samples were undergone
biochemical estimation for the levels of YKL-40, and 25 (OH) vitamin D using ELISA technique, and BMI data
were collected.
Results: Estimation of YKL-40 levels showed that there were 28 No. (93.33%) of EC patients had high level of
YKL-40, while 26 no. (86.67%) of fibroid (benign tumor) patients had low level, and 15(50.00 %) of healthy
control had low. There was a significant difference found in YKL-40 level in EC patients when compared with
the fibroid (benign tumor) patients and healthy control (Pvalue= 0.0001), (Pvalue= 0.0001) respectively. The
highest percent of women with EC and the women with fibroid (benign tumor) had deficiency of 25 (OH)
vitamin D levels (66.67%). While the highest percent of healthy control had sufficiency of 25(OH) vitamin D
level (56.67%). statistically there was significant difference among study groups (p=0.0001). Were as no
significant difference between EC patients and fibroid (benign tumor) patients (P-value =0.822).
Recommendations: Comparing between the ykl-40 marker and other tumor marker diagnostic levels in the
detection of uterine tumors. For further studies, we recommended study the diagnostic levels of ykl-40
marker and its correlation with other body tumors. It is recommended to do estimation of vitamin D levels
with more advanced method and correlation of its with disease.
After 2003 Iraq witnessed a rapid development in the number and kind of non-governmental organizations in addition to the increase in their sources.A lot of obstacles and constraints hinder the development of the said organizations and one of the most important and prominent obstacles is their administrative and accounting structure that affect directly on the existence, continuity and survival of these organizations.This research discussed the concept the non-governmental organizations and reaching the assessment of internal control System in these organizations. Therefore, the researcher has assessed the internal control System applied National Olympic Committee of Iraq. The study showed vulnerabilities in the internal control the said
... Show Moreمن الاهمية دراسة التاريخ كونه يمدنا بحلول للمشكلات المعاصرة في ضوء خبرات الماضي، ودراسة سلبيات وايجابيات هذه الحلول، وانطلاقا من مبدأ أن ذوي الإعاقة البصرية طاقة بشرية لابد من استثمارها بما يخدم تقدم وازدهار المجتمع، فمن الأهمية تسليط الضوء على هذه الفئة والإسهام بنقل صورة مشرفة عنها، قد تكون دافعا للآخرين ممن اوقفهم انطفاء شعاع النور والبصيرة عن اكمال حياتهم لشرارة امل تعيد لهم شغفهم في الحياة، وته
... Show MoreThe research aimed: 1. Definition of family climate for the university students. 2. Definition of statistical significance of differences in family climate variable depending on the sex (males - females) and specialization (Scientific - humanity). 3. Definition of academic adjustment for university students. 4. Definition of correlation between climate and academic adjustment. The research sample formed of (300) male and female students by (150) male of scientific and humanitarian specialization and (150) female of scientific and humanitarian specialization randomly selected from the research community. To achieve the objectives of the research the researcher prepared a tool to measure family climate. And adopted the measure (Azzam 2010)
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More