Preferred Language
Articles
/
jih-1328
Protein bound fucos, protein bound hexose and total calcium in sera of patient with thyroid dysfunction and control
...Show More Authors

Protein bound fucose (PBF), protein  bound hexose (PBHex), and total calcium {T.Ca) were 'determined in sera of (40) hy-p.ertnyroidism , (40)  hypothyroidism patients and (40) controL The resultsr vealed  a significant decrease in the kwel of PBF,  PBHex and T.Ca in sera of patients with .hyperthyroidism  compared  to control; Inc se Qf PBF. there nQ difference in its level betwe.en patients with hypothyroidism and  control  group.  While there  is a significant increment in  PBHex leveli:n both hyper and hypothyroidism With respect to that of control Result  indicates, that total calcium levels were i.n  the nomml range for all p tients groups. Patient  compared   to control  no difference in  the level  of  (PBF) b tween   hypoth.yroid1sm  and  controL  A  significant

increa;;.e in the level of PBHex in sera of hyper and  hypothy:roidJsm

compared to controlwas found.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Sustainable Accounting indicators that related with create value for the firm
...Show More Authors

The business environment is witnessing great and rapid developments due to the economic and technological development that has caused damage to human beings, which requires the need to reduce this damage and work to protect the environment and participate in supporting the social aspects. This requires economic resources to be realized by the economic units. Economic development in preserving the environment that has caused damage and supporting the social aspects that preserve human rights, enhance their position and satisfy their needs in society. Global professional organizations, the United Nations and stakeholder representatives have been issuing the Global Reporting Initiative (GRI) to find guidelines for the preparation of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application
...Show More Authors

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extend Differential Transform Methods for Solving Differential Equations with Multiple Delay
...Show More Authors

In this paper, we present an approximate analytical and numerical solutions for the differential equations with multiple delay using the extend differential transform method (DTM). This method is used to solve many linear and non linear problems.

 

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Medico-legal Update
Asprosin Role for Obese Male Patients with Diabetic Mellitus Type II
...Show More Authors

Hormones, their receptors, and the associated signaling pathways make compelling drug targets because of their wide-ranging biological significance to study the role of asprosin in obese male patients with diabetic mellitus type II. ELISA method was used to assay asprosin and insulin. Blood was taken with drawn sample from 30 obese normal patients with age range (40-60) years, 30 diabetic patients with age range (40-60) years at duration of disease (1-5) years and 30 normal healthy patients. The mean difference between T2DM according to insulin % (23.8±0.6) was increased than the mean of IFG (17.7±1.0) (P 0.000). The mean difference between T2DM according to asprosin (122.1±21.8) was increased than the mean of IFG (51.4±2.7) (P 0

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Ijid Regions
Systemic sclerosis presents its cutaneous manifestations with innovative triple therapeutic regime
...Show More Authors

Scopus
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Hybrid Techniques with Support Vector Machine for Improving Artifact Ultrasound Images
...Show More Authors

     The most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
On Solving Singular Multi Point Boundary Value Problems with Nonlocal Condition
...Show More Authors

In this paper Hermite interpolation method is used for solving linear and non-linear second order singular multi point boundary value problems with nonlocal condition. The approximate solution is found in the form of a rapidly convergent polynomial. We discuss behavior of the solution in the neighborhood of the singularity point which appears to perform satisfactorily for singular problems. The examples to demonstrate the applicability and efficiency of the method have been given.

View Publication Preview PDF
Publication Date
Thu Apr 15 2021
Journal Name
Biochem. Cell. Arch.
CYTOKINES SERUM PROFILE IMMUNOSUPPRESSANT BALB/C MICE INFECTED WITH CRYPTOSPORIDIUM PARVUM
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref