Background: Hypothyroidism is the most abundant thyroid disorder worldwide. For decades, levothyroxine was the main effective pharmacological treatment for hypothyroidism. A variety of factors can influence levothyroxine dose, such as genetic variations. Studying the impact of genetic polymorphisms on the administration of medications was risen remarkably. Different genetic variations were investigated that might affect levothyroxine dose requirements, especially the deiodinase enzymes. Deiodinase type 2 genetic polymorphisms’ impact on levothyroxine dose was studied in different populations. Objective: To examine the association of the two single nucleotide polymorphism (SNP)s of deiodinase type 2 (rs225013 and rs225014) and levothyroxine dose requirements. Subjects and Methods: A cross-sectional study was conducted at Baghdad Center for Nuclear Medicine and Radiation Therapy located in Baghdad/ Iraq, from March to June 2022. Based on levothyroxine dose, the enrolled patients were divided into two groups: low dose group < 1.7 µg/kg/day and high dose group ≥ 1.7 µg/kg. Then genotyping analysis was done for both groups of the study. Results: The mean age of the participants was 40.35 ± 9.5 years with a mean body mass index of 30.61 ± 5.72 kg/m2. The mean levothyroxine doses in the low- and high-dose groups were 81.67 ± 30.74 µg/day and 161.67 ± 35.19 µg/day, respectively. Significant differences existed in the levels of TSH and TT4 between the study’s groups. Conclusion: This study indicated that the differences in levothyroxine dose, TSH, TT4 and TT3 levels were not associated with the DIO2 rs225013. Similarly, the differences in TSH, TT3 and TT4 levels revealed a non-significant association with DIO2 rs225014 except for levothyroxine dose which was higher in the patients who carried the wild type allele (TT).
Background: This study was performed to determine the effect of aging of different types of composite material restorations on: Shear bond strength (SBS) to light cure and no mix chemical cure orthodontic adhesives with sapphire bracket and the debonding failure sites. Materials and methods: One hundred forty four composite disks were made from three different composite resin materials which are: 3M Filtek Z250, 3M filtek Z350 and 3M Valux plus, each group with (48) disks each, then according to the duration of storage each group was subdivided into two equal groups one of them stored for one day and the other was stored for one month, then each group was further subdivided into two equal subgroups with (12) disks each one bonded with ligh
... Show MoreLighting is a very important element of treatment if the color contains many imaging system (digital cameras) and the unit of light and the light within these units are not strong , but usefel when the light is low , in different lighting intensities conditions image quality will not persist good enough and image may become dark or slightly exposed to light which leads to lower the details in image where we can not modify contrast or light ness to compensate thr decrease without losing the light and dark deatials . So we went in this research to study the variation colored texts written on the painting and lighting cases of non –regular ( a few) and different distances . As the diversity of these texts written on the board a
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreAbstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreBackground:This is a prospective study of three children presented to us in the Orbital clinic in AL ShahidGazi Al Hariri Hospital with painless proptosiswith suspension of Hydatid disease.Objectives: : Orbital hydatid disease is a rare lesion accounting for less than 1% of the total lesions of the body (1, 2). Orbital cysts presented as a primary lesion in our study which is rare to have such lesion without involvement of other organs (3). Humans represent the intermediate host where the commonly affected organ are liver and the lung (10-15%) (4). Methods:This is a prospective study of three Children presented to us in the Orbital clinic in Al Shahid Ghazi Alhariri Hospital with painless proptosis with suspension of Hydatid disease, dep
... Show More