Preferred Language
Articles
/
jbcd-2719
Association of a genetic variant (rs689466) of Cyclooxygenase-2 gene with chronic periodontitis in a sample of Iraqi population
...Show More Authors

Background: periodontitis is a chronic inflammatory disease causing destruction of the tooth supporting structures, initiated by dental plaque and modified by environmental and genetic risk factors. Cyclooxygenase-2 (COX-2) enzyme is responsible for the production of prostaglandin E2, an important mediator in the chronic periodontitis (CP) pathogenesis. Polymorphisms in COX-2 gene have linked to CP in different populations. Aim: To study the association between Cyclooxygenase-2 single nucleotide polymorphism rs689466 (-1195A/G SNP) and chronic periodontitis in a sample of Iraqi population. Methods: One hundred Iraqi subjects divided into two groups: case group consisted of 70 CP patient (35 males and 35 females) with age range 30-55 years, and control group consisted of 30 racially matched healthy subjects (15 males and 15 females) with age range 30-50 years. Clinical periodontal parameters including plaque index (PLI), gingival index (GI), bleeding on probing (BOP), probing pocket depth (PPD) and clinical attachment level (CAL) were recoded for all participants. 3ml of venous blood was collected from each participant for isolating genomic DNA. Genotyping of the rs689466 in COX-2 gene was performed using polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) method. Results: The frequency of G allele carriers was significantly more prevalent in the case group compared to control group (P= 0.041), and allele G was associated with greater susceptibility for chronic periodontitis compared to allele A (OR=1.4). Conclusion: COX-2 (rs689466) polymorphism may be associated with increased chronic periodontitis susceptibility.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Egocentrism & its Relationship with Academic Adaptation among University students
...Show More Authors

The research aimed to identifying :

  1. Egocentrism of the university students .
  2. Academic adaptation of the university student.
  3. Differences in Egocentrism according to the both variable ( Gender and Specialization ) of the university student.
  4. Differences in academic adaptation according to the both variable ( Gender and Specialization ) of the university student .
  5. The Contribution of academic adaptation to Egocentrism of the university student .

The sample of the research consisted of ( 400 ) students.      
Tow instruments have been us

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Games with Soft -ᶅ-Pre-Generalized Open Sets
...Show More Authors

    In this paper, the concept of soft closed groups is presented using the soft ideal pre-generalized open and soft pre-open, which are -ᶅ- - -closed sets " -closed", Which illustrating several characteristics of these groups.  We also use some games and   -  Separation Axiom, such as (Æ®0, Ó¼, ᶅ) that use many tables and charts to illustrate this. Also, we put some proposals to study the relationship between these games and give some examples.

View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Multi-objectives probabilistic Aggregate production planning with practical application
...Show More Authors

In this research, has been to building a multi objective Stochastic Aggregate Production Planning model for General al Mansour company Data with Stochastic  demand under changing of market and uncertainty environment in aim to draw strong production plans.  The analysis to derive insights on management issues regular and extra labour costs and the costs of maintaining inventories and good policy choice under the influence medium and optimistic adoption of the model of random has adoption form and had adopted two objective functions total cost function (the core) and income and function for a random template priority compared with fixed forms with objective function and the results showed that the model of two phases wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Journal Of Pioneering Medical Science
Nurses' Perception Toward Therapeutic Strategies for Children with Pneumonia
...Show More Authors

Background: Pneumonia is the common lower respiratory tract infection among pediatrics, especially under five; it is a common cause of under-five children morbidity and mortality. Objectives of study: To identify nurses' perceptions toward therapeutic strategies for children with pneumonia and to find the association between their perceptions and their demographic variables. Methods: A Convenient sample of 46 nurses in Baghdad city from three hospitals) Kadhimiya Hospital for Children, Central Teaching Hospital of Pediatrics, and Child Welfare Teaching Hospital) included in the study to identify their perceptions regarding pneumonia in children. Results: The results of the study present that most of the nurses' participants in the a

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Feb 08 2024
Journal Name
Engineering, Technology & Applied Science Research
Making Different Topographic Maps with the Surfer Software Package
...Show More Authors

The main objective of this study is to describe the preparation of topographic maps using the Surfer software. A total of 159 regularly distributed Ground Control Points (GCPs) were collected with the use of the Differential Global Positioning System (DGPS). Seven methods (Contour Map, Post Map, 3D Surface Map, 3D Wireframe Maps, Grid Vector-1 Map, Color Relief Map, and Shaded Relief Maps) at the Surfer environment were used to prepare the topographic maps at the Mukhtar Village near the Al-Fallujah City. Contour lines with other features were superimposed on the DEM layer, which refers to the topography of the terrain inside this study area. The accuracy of the database's results was estimated, essential maps were given, and the re

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hard and Tough Epoxy Resins Modified with Thermosetting Materials
...Show More Authors

Epoxy resins were modified by some thermosetting materials using unsaturated polyesters which were cured with styrene , MMA ,and MA . When unsaturated Polyester ( as thermosetting material ) was used , and cured with styrene showed better results than acrylic monomers . Thermal stability rised on modification of epoxy resins with unsaturated polyester . The new formulation had converted the epoxy resin from hard brittle material to hard and tough material .

Thermal analysis were studied using ( DSC ) and physicomechanical characteristics were measured .

View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF