Preferred Language
Articles
/
jkmc-966
Pancreatic Stone Protein/ regenerating Protein (PSP/reg) as a Biochemical Marker for prediction of Microvascular Complications of Type 2 Diabetes Mellitus
...Show More Authors

Background: Type 2 diabetes mellitus (T2DM) characterized by insulin resistance (IR) and progressive decline in functional beta (β) cell mass partially due to increased β cell apoptosis rate. Pancreatic stone protein /regenerating protein (PSP/reg) is produced mainly by the pancreas and elevated drastically during pancreatic disorder. Beta cells are experiencing apoptosis that stimulate the expression of PSP/reg gene in surviving neighboring cells, and that PSP/reg protein is subsequently secreted from these cells which could play a role in their regeneration.

Objectives: To analyze serum levels of PSP/reg protein in T2DM patients and evaluate its correlation with the microvascular complications of the disease.

Subjects and Methods: One hundred fifty participants (64 males, 86 females; aged 40–70 years) include T2DM patients with and without microvascular complications as well as healthy controls were enrolled in this study. Biochemical parameters like random blood glucose (RBG), glycated hemoglobin (HbA1c), lipid profile, urea and creatinine (Cr) were measured. Serum values of PSP/reg protein were measured by enzyme- linked immunosorbent assay (ELISA).

Results: Serum levels of PSP/reg protein were found significantly elevated in T2DM patients with microvascular complications compared with those of controls (p<0.001) and T2DM patients without microvascular complications (p< 0.001).PSP/reg protein is correlated with type 2 DM duration (p<0.001), RBG (p<0.001), and HbA1c (p<0.001). The area under the curve (AUC) for the presence of microvascular complications was 0.973.

Conclusion: PSP/reg protein may be used as biochemical marker to predict microvascular complications of T2DM.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
A Novel Invasive Weed Optimization Algorithm (IWO) by Whale Optimization Algorithm(WOA) to solve Large Scale Optimization Problems
...Show More Authors

Abstract  

  In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
H1N1 INFLUENZA VERSUS SEASONAL INFLUENZA MORBIDITY AND MORTALITY: A PROSPECTIVE STUDY IN AL-KINDY TEACHING HOSPITAL/ IRAQ-BAGHDAD
...Show More Authors

Background: H1N1 influenza pandemic or swine flu was an influenza pandemic first described in Iraq in October 2009 .The virus appeared to be anew strain of H1N1 causes wide range of morbidity and mortality among different genders and age groups as part of worldwide pandemics.Seasonal flu is a contagious respiratory illness caused by influenza viruses that infect the nose, throat, and lungs. It can cause mild to severe illness, and at times can lead to death. The best way to prevent the flu is by getting a flu vaccine each year.

Objectives: Is to determine the morbidity and mortality in different age groups in patients with H1N1 influenza versus those patients with seasonal influenza who were admitted at the same time to AL-kindy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Female displacement phenomenon between dispersion and incorporation A field study in Female Training House - Baghdad Wasan mohsin hasan
...Show More Authors

Vagrancy is global problem, but its geographical distribution differs from one society
to another and from one place to another inside the same society.Till now there isn't a real factor that can explain the phenomenon, spite that economy plays aconstituent and distinguishing part, and spite the fact that Vagrancy is considered a realdeviation that can be compared with criminality level, and cannot be separated from its effecton family, local society and school. In addition to unprecedented work under heavily pressurethat attack to a minimum protection and safety. Vagrant may be a child, a teen, a young, or
even an old man. Vagrancy thus means different people with different ages and not onlyprecisely children. Vagrant is not neces

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Imams al-Imam al-Bazazi (AH827) in his book al-Fatawi al-Bazazi issues purity is a model
...Show More Authors

The study included three topics, the definition of the personality of Imam al-Bazazi, his scientific biography, his elders, his writings, his students and his death, selected issues of his weightiness related to purity, and the Imam al-Bazazi is Muhammad ibn Muhammad ibnShihabibn Yusuf, known in al-Kardari al-Hanafi al-Balzazi. The other doctrines, the author relied in his book on the sources of the previous scholars of the Hanafis, and make them the basis in his book, the author did not adopt the definitions of language and terminology, and rarely mention the evidence Shariah adopted by scientists in their opinions, and limited to mention only opinions, In front of the first issue spotlessly water user, and the second issue that sleep l

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
How geometric reverse engineering techniques can conserve our heritage; a case study in Iraq using 3D laser scanning
...Show More Authors
Abstract<p>Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte</p> ... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Synchronous Buck Converter with Perturb and Observe Maximum Power Point Tracking Implemented on a Low-Cost Arduino-microcontroller
...Show More Authors

Maximum power point tracking (MPPT) is used in photovoltaic (PV) systems to enhance efficiency and maximize the output power of PV module, regardless the variation of temperature, irradiation, and the electrical characteristics of the load. A new MPPT system has been presented in this research, consisting of a synchronous DC-DC step-down Buck converter controlled by an Arduino microcontroller based unit. The MPPT process with Perturb and Observe method is performed with a DC-DC converter circuit to overcome the problem of voltage mismatch between the PV modules and the loads. The proposing system has high efficiency, lower cost and can be easily modified to handle more energy sources. The test results indicate that the u

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
Judicial Legislations and the Tribal Claims System in the Royal Period: A Documentary Study: احمد عبدالواحد عبد النبي
...Show More Authors

The present research tackles a number of historical facts and incidents with a purely legal dimension in an important stage in the contemporary history of Iraq, especially the era of the British occupation. This resulted in innumerable social, political and legal problems, particularily the judicial legislation problems in Iraq. These legislations included a set of civil laws and in force governmental procedures that will be discussed historically by examining documents issued by the Ministries of Justice and Interior Affairs in the governments of monarchy for the period from 1921-to-1958. The data of the present paper relied on the Iraqi Library and Archives, (hence DKW). The study adopted the narrative historical methodology when inves

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Social, Humanities And Administrative Sciences
QUESTIONING GENDER ROLES IN THE AWAKENING: A BEAUVOIRIAN STUDY (UYANIŞ ROMANINDA CİNSİYET SORUNU: BEAUVOİR'IN DÜŞÜNCEİNE DAYALI BİR ÇALIŞMA)
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref