Obesity and cancer are two major epidemics of this century. Obesity is related to a higher risk of many types of cancer. Studies have accessed circulating adipokines, as key-mediators in obesity and breast cancer. The study is aimed to examine the circulating levels of insulin-like growth factor-1, leptin, adiponectin, and resistin in premenopausal Iraqi women with breast cancer. The current study was performed during the period from June 2019 to December 2019 at Oncology unit/ Medical City Hospital-Baghdad. A total of 90 premenopausal women with BC/ stage II and III after 2nd dose of chemotherapy were contributed in this study as patients group. Their ages ranged from (35- 50) years in addition to 90 premenopausal healthy women wer
... Show MoreThe current study was designed to remove Lead, Copper and Zinc from industrial wastewater using Lettuce leaves (Lactuca sativa) within three forms (fresh, dried and powdered) under some environmental factors such as pH, temperature and contact time. Current data show that Lettuce leaves are capable of removing Lead, Copper and Zinc ions at significant capacity. Furthermore, the powder of Lettuce leaves had highest capability in removing all metal ions. The highest capacity was for Lead then Copper and finally Zinc. However, some examined factors were found to have significant impacts upon bioremoval capacity of studied ions, where best biosorption capacity was found at pH 4, at temperature 50º C and contact time of 1 hour.
Diabetic nephropathy (DN) is the foremost cause of end-stage renal disease. Early detection of DN can spare diabetic patients of severe complications. This study aimed to evaluate the diagnostic value of red cell distribution width (RDW) and neutrophil-lymphocyte ratio (NLR) in the detection of DN in patients with type 2 diabetes mellitus (T2DM). This cross-sectional study included a total of 130 patients with T2DM, already diagnosed with T2DM. The albumin creatinine ratio (ACR) in urine samples was calculated for each patient, according to which patients were divided into two groups: with evidence of DN when ACR ? 30 mg/g, and those with no evidence of DN when ACR < 30 mg/g. According to multivariate analysis, each of disease duration (OR
... Show MoreThe present study aims at scrutinizing the impoliteness types, causes, and purposes utilized by Iraqi English language learners when refusing marriage proposals. Thus, it attempts to answer the questions: (1) what are the impoliteness formulas used by the Iraqi learners of English in refusing marriage proposals?, and (2) What are their impoliteness triggers/causes and the purposes? The study is significant in bridging the gap that few linguistic types of research concentrate on studying intentionality and emotions allied with impoliteness. Data were collected from 35 Iraqi learners of English responding to 6 situations of marriage. The data were analyzed using Culpeper’s (2011) formulas of impoliteness and Bousfield’s (2007) impolite
... Show MoreObjective: To suggest a weighted measure to diagnose the reasons for the low student success ratios in mathematics concerning the third grade of intermediate schools in light of components educational system represented by: [Students, Teachers, Curriculum, and Environmental reasons (others reasons)] assuming differentiated and interrelated components, Also the effectiveness forming of these components according to the gender variable. Methods: Data collection tools were prepared by constructing two questionnaires for each of (Students and Teachers), which included a number of items that involved some domains for studied components of educational system, which demonstrated a high level of validity and reliability in the pilot study, in addi
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the