Preferred Language
Articles
/
jhgvDpYBVTCNdQwCF4HQ
Role of activin a hormone, betacellulin (BTC) growth factor, and Heparin binding epidermal growth factor on mice embryonic development after oral administration of glycyrrhiza glabra
...Show More Authors

Glycyrrhiza glabra is a herbal plant used for treatment of many infertility diseases. Its roots, a common herbal source, are described to soothe fetuses in pregnant mice, but there isn't enough research to know if it's safe to take during pregnancy and its effects on implantation factors. This study examines the impact of the growth factors betacellulin (BTC), heparin-binding epidermal growth factor, and activin A hormone on embryonic development after oral administration of Glycyrrhiza glabra aqueous extract to mice. In line with clinical use, an aqueous extract of Glycyrrhiza glabra roots was prepared. Pregnant mice were randomly assigned to one of four groups: Two mice groups 8 and 28 weeks old treated with water as a negative control, mice aged 8 weeks old treated with aqueous extract from one of two groups for 10 days, and mice 28 years old treated with aqueous extract for 10 days. On study groups, the parameters of certain implantation factors such serum progesterone and Activin A hormones, Heparin-binding epidermal growth factor and betacellulin (BTC) growth factor were evaluated. The four groups had substantial differences in parameters. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (239)
Crossref (183)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Management Representations Effect on Auditor Responsibility: Applied Research in a sample of Companies under Control and Audit of BSA and private sector auditing offices
...Show More Authors

Management Representations Letter plays a significant role as an evidence to get conclusions the Auditor is looking for. These conclusions could show the professional opinion of auditor over the fairness and integrity of financial statements for many issues and numbers that management claims, Hereby, the research aims at highlighting the importance of Management Representations Letter and the way of using as an evidence with expressing its meaning and means of application in addition to identify the Responsibility of Auditor on that Letter, This research discusses also the effect of Management Representations Letter on the credibility of financial statement and enhancing the credibility of the submitted reports, From other side, in the t

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Indicators of Mental image among Students of the University of Baghdad about Iraqi Political Parties-(a research based on a master thesis)
...Show More Authors

Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Vigilance and strategic role in improving the level of nursing services / Applied Research in Ghazi al-Hariri Hospital
...Show More Authors

The current research aims to focus on strategic vigilance dimensions and contained (environmental vigilance, technological vigilance, competitive vigilance, vigilance marketing) to improve nursing services, which include a) the quality, timeliness, problem-solving and decision-making, relationships with others, leadership skills) and measure the degree link and influence between strategic vigilance in the hospital respondent and improve nursing service that the problem of the research lies in the weakness of strategic plans and health organizations in general and the hospital surveyed (martyr Ghazi al-Hariri), in particular, the lack of awareness of the hospital researched strategy vigilant management to improve nursing services,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
DNA Methylation Patterns of Interferon Gamma Gene Promoter and Serum Level in Pulmonary Tuberculosis: Their Role in Prognosis
...Show More Authors

Tuberculosis (TB) still remains an important medical problem due to high levels of morbidity and mortality worldwide. A series of innate immune mechanisms that create a cytokine network control the pathogenesis of tuberculosis and this response has the capacity to modify the host genomic DNA structure through epigenetic mechanisms such as DNA methylation which could constantly alter the local gene expression pattern that can modulate the metabolism of the tissues and the immune-response. Interferon-gamma (IFN-γ) is an important pro-inflammatory cytokine regulator of the innate immune response to TB. This study aims to determine DNA methylation patterns of INF-γ gene promoter and measure serum IFN- γ level in newly diagnosed TB patient

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Nov 09 2023
Journal Name
Biomedicine
Role of immunological and biochemical markers in bone turnover in type I diabetic patients in Karbala province, Iraq
...Show More Authors

Introduction & Aim: Long-term diabetes mellitus (DM) is known to have a deleterious impact on bone health, resulting in change in bone mineral density, bone turnover, and bone quality, all of which increase the risk of fractures. The aim of. this study was to link immunological and pro-inflammatory cytokine (I.L-6, I.L-1, and TNF-alpha) markers in patients.with type 1 diabetes to Their connection to bones formation (sPINP) and bone resorption parameters (sCTX).   Materials & Methods: This study included 80 patients suffering from T1DM in the age range of 20-45 years. The patients were assayed for their biochemical (Vitamin D and HbA1c), Immunological (IL-6, IL-1 and TNF-alpha) parameters, as well as bone formation and resor

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Technological Maturity and its role in reinforcing the quality of auditing: An analytical study in Iraqi audit offices
...Show More Authors

This paper discusses the role of Auditors' Technological Maturity in reinforcing the quality of auditing profession, through focusing on the concepts of Technological Maturity and quality of auditing profession, as well as designing a proposed model for Technological Maturity which includes five evolutionary and sequential stages, and this proposed model would contribute to reinforce the quality of auditing. This proposed model will be employed in the field of auditing profession because the importance of the development and investment in this profession and the importance of the need for specialized knowledge in Information Technology, and the result of a proposed model is development of technological knowledge for the auditor to reach

... Show More
View Publication Preview PDF