Background: Growth hormone is a hormone responsible for the normal body growth and development by stimulation protein production in muscle cells and
energy release for breakdown of fat. On the other hand leptin is a newly discovered hormone that is mainly synthesized in adipose tissues it decreases food intake by
causing satiety and promoting energy combustion . Both aging and obesity are associated with a reduction in growth hormone secretion. In the mean time obese
humans have increased circulating leptin.
Objective: The aim of this paper is to shed light on the contribution of these two hormones in the mechanism of aging process in an attempt of improving this
process for a better life at old ages. Sera from blood samples were used to carry out certain biochemical parameters and hormone (growth hormone and leptin).
Results: The results obtained show a decrease in the level of growth hormone with progression of age. In the mean time there is an increase in the level of serum leptin
with the advancement of age. Aging is usually associated with adiposity. Increasing fat with age is probably multifactorial one potential mechanism for that is reduced
leptin transport across blood-brain barrier..
Conclusion: The increase in leptin level which was observed in elderly age group and obese group suggest that the associated decrease in growth hormone serum
level is related to obesity in general and in particular to the aging process.
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreIris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin
... Show MoreThe aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
- The problem of infertility considers one of the chronic problem a which faced the
individual & families equally . This problem causes a negative effects in psychological ,
social and development fields. The infertility contributes in weakening the human
development, when the human development has become as a centre point which centered
about individual preparing , rehabilitation, training and knowledge toreach to the required
excellence.
We think that , the infertility destroys the socially development; therefore the socially and
scientific institutions are working hard to find successful solution to resolve the problem
infertility through sophisticated and scientific methods. This problem
The research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi
... Show MoreThe quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.
FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic
... Show MoreAuthentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi
A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c