Preferred Language
Articles
/
injns-165
Detection the level of YKL-40 biochemical marker and vitamin D level in sera of Iraqi Uterine cancer females' patients
...Show More Authors

Objective: Detection the level of YKL-40 biochemical marker and vitamin D level in sera of Iraqi uterine cancer
females' patients.
Methodology: This study included 90 female volunteers, 30 of them were healthy volunteers who were
considered as a control group, while sixty serum samples were collected from women patients suffering from
uterine tumors (30 malignant and 30 fibroid benign tumors), benign cases were considered as a disease
control group for malignant tumors. The average age of those females was 30-75 years, which matched the
control group. All the samples were collected from Azady hospital in Kirkuk and the gynecologic department at
Medical City in Baghdad during October /2012 to May /2013. All the serum samples were undergone
biochemical estimation for the levels of YKL-40, and 25 (OH) vitamin D using ELISA technique, and BMI data
were collected.
Results: Estimation of YKL-40 levels showed that there were 28 No. (93.33%) of EC patients had high level of
YKL-40, while 26 no. (86.67%) of fibroid (benign tumor) patients had low level, and 15(50.00 %) of healthy
control had low. There was a significant difference found in YKL-40 level in EC patients when compared with
the fibroid (benign tumor) patients and healthy control (Pvalue= 0.0001), (Pvalue= 0.0001) respectively. The
highest percent of women with EC and the women with fibroid (benign tumor) had deficiency of 25 (OH)
vitamin D levels (66.67%). While the highest percent of healthy control had sufficiency of 25(OH) vitamin D
level (56.67%). statistically there was significant difference among study groups (p=0.0001). Were as no
significant difference between EC patients and fibroid (benign tumor) patients (P-value =0.822).
Recommendations: Comparing between the ykl-40 marker and other tumor marker diagnostic levels in the
detection of uterine tumors. For further studies, we recommended study the diagnostic levels of ykl-40
marker and its correlation with other body tumors. It is recommended to do estimation of vitamin D levels
with more advanced method and correlation of its with disease.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Computational Biology And Chemistry
A graph-based multi-sample test for identifying pathways associated with cancer progression
...Show More Authors

Cancer is in general not a result of an abnormality of a single gene but a consequence of changes in many genes, it is therefore of great importance to understand the roles of different oncogenic and tumor suppressor pathways in tumorigenesis. In recent years, there have been many computational models developed to study the genetic alterations of different pathways in the evolutionary process of cancer. However, most of the methods are knowledge-based enrichment analyses and inflexible to analyze user-defined pathways or gene sets. In this paper, we develop a nonparametric and data-driven approach to testing for the dynamic changes of pathways over the cancer progression. Our method is based on an expansion and refinement of the pathway bei

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Psychological and Health Risks of Children Toy-Related Injuries: Pellet-Gun as a Model
...Show More Authors

The research aims to identify the psychological and health risks that a child might be exposed to by playing with hazardous toys such as pellet guns. To this end, the researcher has visited Ibn Al-Haytham Eye Hospital in Baghdad, the emergency department to figure out the rate of injuries in Children for the consecutive years (2017-2018) and the first Month of (2019). The psychological risks as a result of disability are represented by the inability to accommodate the surrounding environment well. Additionally, the child experiences a kind of tension, conflict, and going in psychological crises through introversion, isolation, withdrawal tendencies, and poor conformity with himself and the Society.

View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Macromolecular Symposia
Synthesis of 5‐Fluorouracil–Naproxen Conjugates as a Mutual Prodrug for Targeting Cancer Tissues
...Show More Authors
Abstract<p>A new 5‐fluorouracil–naproxen conjugate is synthesized as a mutual prodrug for targeting cancer tissues. The structure of the target compound and their intermediate are characterized by their melting point, IR, <sup>1</sup>H NMR, <sup>13</sup>C NMR, and elemental microanalysis. The cytotoxic activity is preliminarily evaluated using nonsmall lung cancer CRL‐2049, human breast cancer CAL‐51, and one type of normal cell line; rat embryo fibroblast cell line. The synthesized compound shows a good cytotoxic effect at the cancer cell and no significant effect at rat embryo fibroblast cell line.</p>
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of serum levels of monocyte chemoattractant protein 1 (MCP 1) in patients with periodontitis and atherosclerotic cardiovascular disease
...Show More Authors

Background: Monocyte chemotactic protein-1 (MCP-1) is a chemokine expressed by inflammatory and endothelial cells. It has a crucial role in initiating, regulating, and mobilizing monocytes to active sites of periodontal inflammation. Its expression is also elevated in response to pro-inflammatory stimuli and tissue injury, both of which are linked to atherosclerotic lesions. Aim of the study: To determine the serum level of MCP-1 in patients with periodontitis and atherosclerotic cardiovascular disease in comparison to healthy control and evaluate the biomarker's correlations with periodontal parameters. methods: This study enrolled 88 subjects, both males and females, ranging in age from 36-66 years old, and divided into four groups: 1<

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref