Gestational diabetes mellitus (GDM) is a growing health concern that usually appears during the second and third trimester stage of pregnancy and is characterized by carbohydrate intolerance of variable severity. The aim of the present study was to scrutinize the relationship between the G972R polymorphism of the insulin receptor substrate-1 (IRS-1) gene with GDM in the Iraqi female population. One hundred and twenty of blood samples taken from healthy women (control) and women with gestational diabetes mellitus in 3rd trimester stage of pregnancy, fasting blood glucose (FBG) and HbA1c% measured to diagnose GDM, lipid profile (cholesterol, triglyceride, HDL, LDL, and VLDL), insulin concentration, insulin resistance and beta cell function to determine risk factor for GDM, molecular study consist of DNA extraction and RFLP- PCR to study Genetic variation of IRS1gene in women with GDM. The fasting blood glucose mg/dl and HbA1c% level was increased highly significantly (P<0.01) between patient (GDM) and control ( healthy women ) in 3rd trimester stage in addition lipid profile included cholesterol mg/dl, triglyceride mg/dl, LDL mg/dl , VLDL mg/dl insulin concentration and insulin resistance but level of HDL mg/dl and beta cell function were decreased highly significantly (P<0.01) between patient (GDM) and control. Also the frequency of allele T was recorded a highly significantly (P<0.01) in patient (GDM) (0.87%) while in control(0.60%), the frequency of allele C allele significant (P<0.01) in control(0.40%) while (0.13%) in patient (GDM) in third trimester stage in pregnancy in third trimester. The results of this study it can be concluded that the genetic variation of IRS1 gene was associated with gestational diabetes mellitus comparison in control (healthy women) in Iraqi women in third trimester of pregnancy.
Cardiovascular risk is independently increased by plasma lipids abnormalities (low- density and high density lipoprotein -cholesterol and triglycerides). Most patients have more than one lipid abnormality. Combination therapy with lipid-modifying agents could offer an important therapeutic option for improving the overall lipid profile. Combinations have demonstrated to provide additive efficacy and significant reductions in coronary events . This study was designed to evaluate the effect of ezetimibe, when used in combination with other hypolipidaemic agents ( statins) on lipid profile as well as on liver function ,renal function, oxidative stress, and platele
... Show MoreAnxiety has become a highly paramount field of research attention in psychopharmacology today. Sundry studies have shown a nitric oxide role in the regulation of anxiety. The goal of the study was to investigate sodium nitroprusside ability to affect anxiety-like behavior in mice and to compare this effect with the standard anxiolytic drug, diazepam, using both plus maze test and light/dark box test. The results revealed that sodium nitroprusside at a dose of 1 mg/kg had a significant effect on the behavior in both of the elevated plus maze test and light/dark test. However, at higher dose (3 mg/kg), it has significantly increased the anxiogenic-like effect in the light/dark box test. Diazepam at a dose of 2 mg/kg increased the time spen
... Show MoreObesity is disorder in a foremost nutritional health it’s developed with countries developing. Also is known as increasingin fat accumulation that lead toproblem in health, besidesmay coin one of the reasons lead toloss of life,the obesity not effect on adults just but effect onoffspringand juveniles. In some ofinhabitants the incidence of obesity is superior in female than in male; on the other hand, the variation degree of the between the genderdifferby country.Obesity is generally measured by body mass index and waist circumference, Obesity are classified according to body mass index into:Pre obesity sort 1 : (25 - 29.9) kg/m2, Obesity sort 2 : (30 - 34.9 kg/m2) and extreme obesity sort 3: (40 kg/m2) or greater. Obesity is described by
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreSurvival analysis is the analysis of data that are in the form of times from the origin of time until the occurrence of the end event, and in medical research, the origin of time is the date of registration of the individual or the patient in a study such as clinical trials to compare two types of medicine or more if the endpoint It is the death of the patient or the disappearance of the individual. The data resulting from this process is called survival times. But if the end is not death, the resulting data is called time data until the event. That is, survival analysis is one of the statistical steps and procedures for analyzing data when the adopted variable is time to event and time. It could be d
... Show MoreThe integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period. &nb
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant
... Show More