Preferred Language
Articles
/
vBjGDZUBVTCNdQwCeiTW
The Significance Of Maternal Total Serum Homocysteine Level In Iraqi Mothers Who Had Previous Babies With Neural Tube Defects
...Show More Authors

Background: Neural tube defects (NTDs) are said to be inherited in a multifactorial fashion, i.e. genetic-environmental interaction. Maternal nutritional deficiencies had long been reported to cause NTDs, especially folate deficiency during early pregnancy. More attention had been paid to the exact mechanism by which this deficiency state causes these defects in the developing embryo. The most significant of all researches was that connecting reduced folate and increased homocysteine level in maternal serum on one hand and the risk of developing a NTD baby on the other hand. Objectives : to determine the significance of homocysteine level in Iraqi mothers who gave birth to babies with NTDs as compared to normal controls. Patients, Materials and Methods: Fifty Iraqi women having babies born with NTDS, referred to the genetic clinic in Baghdad Teaching Hospital, were included in this study (the study group) as well as 37 healthy women having normal children (the control group). This study was conducted from November, 2002 till October, 2003. Analysis of total serum homocysteine level for all women was done using a computerized HPLC system. Results : the age of women in both groups was comparable (mean+SD in the study group was 26.2+5.14 years vs. 26.3+4.57 years in the controls). Among the study group, 4 (8%) had normal tHcy level; 44 (88%) had mildly elevated level, and only 2 (4%) had moderately elevated tHcy level, while all (100%) women in the control group had their tHcy level within normal level. This difference was statistically highly significant (p<0.001). Conclusions : Women become at an increased risk of delivering a baby with NTD when having an elevated tHcy level in their sera, and that tHcy level is an important marker in maternal serum that is associated significantly with pregnancy outcome.

Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE OF COMMODITY DUMPING IN ENCOURAGING THE IRAQI CONSUMER TO BUY NON- ESSENTIAL GOODS: THE ROLE OF COMMODITY DUMPING IN ENCOURAGING THE IRAQI CONSUMER TO BUY NON- ESSENTIAL GOODS
...Show More Authors

ABSTRACT

The research aims to study the effect of the commodity dumping phenomenon that Iraq suffered after 2003 on the consumption pattern of individuals, towards the acquisition of non-essential goods (luxury). To achieve our goal we relied on the questionnaire as a main tool for obtaining information related to the research, and it was distributed on a random sample of consumers in the city of Baghdad with 250 questionnaires. The answers of the research sample were analyzed using the statistical program (SPSS). The percentage weights and the factorial analysis method were used also to arrange the variables that affected on changing consumption patterns. The research reached a set of conclusions:

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 05 2014
Journal Name
International Journal Of Pharmacy And Pharmaceutical Sciences0975-1491
THE CORRELATION BETWEEN FRAMINGHAM RISK SCORE AND THE CLINICAL AND BIOCHEMICAL PARAMETERS THAT MEASURE FUNCTIONAL DISABILITY AND DISEASE ACTIVITY IN IRAQI PATIENTS WITH RHEUMATOID ARTHRITIS
...Show More Authors

Objective: Rheumatoid arthritis (RA) patients have increased morbidity and mortality from premature cardiovascular (CV) disease (CVD). Framingham risk score (FRS) is a simplified coronary prediction tool developed to enable clinicians to assess the risk of a cardiovascular event and to identify candidate patients for risk factors modifications worldwide. The predictive ability of the FRS varies between populations, ethnic groups, and socio-economic status. The aim of this study is to find if there is any correlation between the Framingham risk score and the inflammatory and biochemical parameters used to measure disease activity and functional ability in Iraqi patients with active RA.

View Publication
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Immunohistochemical Targeting of p110β Isoform of phosphatidylinositol 3-kinase co-associated with Cyclin-Dependent Kinase 1 in a Group of Tissues from Iraqi Patients with Breast Cancer
...Show More Authors

Background: While two-thirds of breast cancers express hormone receptors for either estrogen (ER) and/or progesterone (PR) , genetically altered PI3K pathway was found in more than 70% of ER-positive breast cancers.An aberrant activity of cyclin-dependent kinase 1 (CDK1) in a wide variety of human cancers has selectively constituted an attractive pharmacological targets in MYC-dependent human breast cancer cells.

Aim of the study:  Role of p110-beta as well as and CDK 1  in the pathogenesis of subset of breast cancers and contribution in their carcinogenesis.

Type of the study: is a retrospective study

Methods: This retr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Aims Mathematics
Solving quaternion nonsymmetric algebraic Riccati equations through zeroing neural networks
...Show More Authors

<abstract><p>Many variations of the algebraic Riccati equation (ARE) have been used to study nonlinear system stability in the control domain in great detail. Taking the quaternion nonsymmetric ARE (QNARE) as a generalized version of ARE, the time-varying QNARE (TQNARE) is introduced. This brings us to the main objective of this work: finding the TQNARE solution. The zeroing neural network (ZNN) technique, which has demonstrated a high degree of effectiveness in handling time-varying problems, is used to do this. Specifically, the TQNARE can be solved using the high order ZNN (HZNN) design, which is a member of the family of ZNN models that correlate to hyperpower iterative techniques. As a result, a novel

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An adaptive neural control methodology design for dynamics mobile robot
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref