Preferred Language
Articles
/
jbcd-2463
Determination the concentration of insulin-like growth factor-I (IGF-I) in saliva of acromegalic patients, and comparison it with the levels of serum IGF-I.
...Show More Authors

Acromegaly is ametabolic disorder characterized by an acquired progressive somatic disfigurement, mainly involving the face, extremities and many other organs, that are associated with systemic manifestations, caused by excessive secretion of growth hormone and a resultant persistent elevation of insulin-like growth factor-I concentrations. In more than 90% of cases originates from a monoclonal benign pituitary adenoma. Aim of this study to assess the level of insulin-like growth factor-I (IGF-I) in saliva of acromegalic patients, and to compare it with the basal levels of serum IGF-I. Sixty specimens of serum and saliva collected from two groups of subjects (forty acromegalic patients and twenty healthy persons). The specimens were centrifuged and stored at -20ºC then IRMA kits were used for estimating insulin like-growth factor-I. The results show that acromegalic patients had significantly higher salivary insulin like growth factor-I concentrations than healthy subjects (mean 21.26 vs. 20.48ng/mL; p=0.041), serum insulin like growth factor-I concentrations (mean 782.21 vs. 199.87ng/mL; p<0.001), there is significant correlation between salivary and serum insulin like growth factor –I in acromegalic group, whiles no significant correlation in control group, Salivary IGF-I concentration may not represented the corresponding serum concentration adequately, so cannot be considered it as alternative diagnostic tool to the acromegalic patients

Crossref
View Publication
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators
...Show More Authors

This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that  functions as an act over S if and only if  functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and  is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following,  is acting over S if and only if  is a module where T is a nilpotent operator, is a

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
CFD Application on Shell and Double Concentric Tube Heat Exchanger
...Show More Authors

This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).

Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors.  The RNG k-ε model of turbulence is used to determining the accurate results from CFD.

The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Mar 28 2022
Journal Name
The Open Dentistry Journal
Depression, Anxiety and Stress Among Dentists During COVID-19 Lockdown
...Show More Authors
Introduction:

The objective of this study was to investigate the levels of depression, anxiety, and stress among dentists during covid-19 lockdown and to investigate the relationship between stress and each mental health state.

Methods:

A cross-sectional survey on 269 dentists was conducted using DASS-21 and PHQ-9 questionnaires. Bivariate and multivariate models were constructed and the odds ratio (OR) was calculated to assess the strength of the association between an independent categorical variable and the outcome.

Results and Discussion:

Being unsatisfied with the job was as

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
2019 International Joint Conference On Neural Networks (ijcnn)
A Fast Feature Extraction Algorithm for Image and Video Processing
...Show More Authors

View Publication
Scopus (40)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Networks And Systems
Using Artificial Intelligence and Metaverse Techniques to Reduce Earning Management
...Show More Authors

This study aims to demonstrate the role of artificial intelligence and metaverse techniques, mainly logistical Regression, in reducing earnings management in Iraqi private banks. Synthetic intelligence approaches have shown the capability to detect irregularities in financial statements and mitigate the practice of earnings management. In contrast, many privately owned banks in Iraq historically relied on manual processes involving pen and paper for recording and posting financial information in their accounting records. However, the banking sector in Iraq has undergone technological advancements, leading to the Automation of most banking operations. Conventional audit techniques have become outdated due to factors such as the accuracy of d

... Show More
View Publication
Scopus (1)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Epitoanyag - Journal Of Silicate Based And Composite Materials
Flame retardants, their beginning, types, and environmental impact: a review
...Show More Authors

The current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Psychological Flow and Its Relation to Futuristic Thinking among Postgraduates
...Show More Authors

The research seeks to find the relationship between psychological flow and futuristic thinking among postgraduate students. To this end, the researchers have made up two scales: one scale to measure the psychological flow which consisted of (32) items and the other to measure the futuristic thinking included (39) items which were distributed into three domains. As to collect the required data, the two scales had applied on a sample comprised (200) postgraduate students. The findings revealed that there is a correlation between psychological flow and futuristic thinking. The researcher recommended the coming studies take the relationship between psychological flow and psychological happiness.

View Publication Preview PDF