Postmenopausal women with hypertension may be linked with cardiovascular risk factors like visceral obesity. Changes in antioxidant levels and lipid profile are considered risk factors concerning heart disease that arises during postmenopausal. Ninety Iraqi women aged between 53-70 years, sixty women with postmenopausal hypertension, and thirty healthy postmenopausal women were selected as control for this study. Blood samples were taken to measure some antioxidants through enzyme-linked immune sorbent assay (ELISA) and lipid profile by enzymatic technique. Results showed that the mean of catalase levels was significantly lower in patients (257.62±6.99) compared towith the control group (499.30±13.08). Glutathione results were si
... Show MoreResults of the current study demonstratedthat out of eighty-three isolatesof Pseudomonas aeruginosa,only twenty-five isolateswere resistant to five different antibiotics (of different classes) that were consequentlyconsideredmultidrug resistant isolates.These isolates developed variable susceptibility toward Eucalyptuscamaldulensisleavesoil (ECO). GC-MS analysis of ECOrevealed that the aromatic oil eugenol is the major constituent.However, the most frequent MIC was 0.39 µg/ml, while the lowest frequent MIC was 3.125 µg/ml.Moreover, this oil at ½ MIC (0.195µg/ml) increased the gene expression of exoU. Itis concluded from the outcomes of the studythat ECOmay cause severe damagewhen used to treat infections ca
... Show MoreThe lightweight block cipher is an encryption technique with negligible computational overhead. Despite its advantages, it faces a substantial challenge. Correct handwriting of the script code for the cipher scheme is a challenge for programmers. In this research, we suggest a new graphical domain-specific modeling language to make it easier for both non-technical users and domain specialists to implement lightweight block cipher schemes. The proposed language, called LWBCLang, is a modular and extensible language that offers graphical components for constructing three essential types of inner block cipher structures. Seven different methods of keystream generation and all the tests of the NIST suite with performance analysis are provide
... Show MoreIn this article, two-dimensional unsteady incompressible viscous nanofluids magneto-hydrodynamic (MHD) flow among two parallel plates extended infinitely is investigated. The equations that results from the use of similarity transformations for non-linear partial differential system are solved by the new algorithm. The important key to this construct is the derivatives that appear as coefficients in the power series. The effects of apparent physical parameters on velocity concentration and temperature distributions are described using a schematic diagram and interpreted physically. The effects of apparent physical parameters on concentration, temperature, and velocity distributions are described by graphs. For the flow of nanofluids, the
... Show MoreThis article introduces the concept of strongly-WH module which is a proper generalized of Hopfian modules. A module is called strongly-WH, briefly -WH if, any -small surjective -endomorphism of is an automorphism. We specify and provide some properties of this concept. Furthermore, we have established connections between strongly-WH modules and various other concepts. We demonstrate that every strongly-WH module is -weakly Hopfian. As well as, we provide cases in which the concepts of WH, -weakly Hopfian, and strongly-WH modules are equivalent.
For the solution of fractional-order two-dimensional Navier-Stokes equations (FOTDNSEs), the current work proposes a novel variant of the Laplace Adomian decomposition approach with the Atangana-Baleanu fractional operator in the Caputo sense (ABCFO). In this approach, the solution is considered as a Taylor series expansion that converges rapidly to the exact solution. Only two components are required for the new approximation analytical technique. When compared to other strategies, the current method is very simple, requires less calculation, and is extremely accurate.
Rheumatoid arthritis (RA) can cause permanent joint damage and disability through inflammation in the joints. Other organs, such as blood vessels, lungs, heart, eyes and skin may also get affected. This study aimed to evaluate the changes of some oxidative stress markers including oxidative DNA damage and the clinical outcomes that are associated with Iraqi rheumatoid arthritis patients. Commercial enzyme linked immunosorbent assay (ELISA) kits were applied to evaluate malondialdehyde (MDA), DNA damage marker 8-hydroxy-2-deoxyguanosine (8-OHDG), and glutathione peroxidase 3 (GPX3) levels in serum of 60 patients having RA with ages ranging between 20-70 years and 30 age-matched healthy controls. The results showed a significant increase i
... Show MoreThis work aimed to study the degree topology of certain types of graphs namely, the wheel, helm, gear, pan, tadpole, and windmill graphs, respectively. In addition, a new separation axiom known as -space that joins the topological space and paths in the graph is introduced. Also, the relation between -space and the degree-topology of the connected and disconnected graph was stydied. Moreover, many examples were studied in new separation space.
The purpose of this work is to determine transferred heat features and irreversible transport peristaltic of nanomaterial fluid through a porous medium with an inclined symmetric channel. Expression of the basic velocity, pressure gradient, temperature, and stream function profiles within the boundary layer are plotted and discussed in detail via various values of the distinct parameters. Nanoparticles of hybrid nanomaterial impacts are also used. In the present article, water is used as a base liquid while nanoparticle contain polystyrene and graphene oxide. Over time, it is observed that there are distinct factors and effects such as magnetic field and porosity parameters. Mathematica software is used for estimating the exact solutions
... Show MoreThe purpose of this paper is to discuss the centralizers and the double centralizers in prime and semiprime rings with fulfilling certain identities.
Speech is a signal produced by humans to interact and communicate. Different information is gained from speech signals, such as the language being spoken, emotion, gender, speaker identification, and other information. Speech signals are exposed to different noises, which can be generated at the beginning of the speech or during the transmission. Due to this problem, noise reduction processes are an interesting field in different communication application systems that cultivate the intelligibility and quality of speech signals. It refers to removing or reducing the background noise in order to obtain an improved quality of the original speech signal without distorting the original (clean) signal. This paper reviews the state-of-the-art r
... Show MoreSpeech separation is crucial for effective speech processing in multi-talker conditions, especially in real-time, low-latency applications. In this study, the Time-Domain Audio Separation Network (TasNet) and Dual-Path Recurrent Neural Network were used to perform a time-domain multiple-speaker speech separation challenge. One-dimensional conventional recurrent neural networks (RNNs) are not capable of accurately simulating long sequences. When their receptive length exceeds the sequence field, 1-D CNNs cannot recreate utterance-level sequences. Dual-Path Recurrent Neural Network (DPRNN) breaks up the lengthy sequential input that progressively performs intra- and inter-chunk operations with input lengths proportional to the square root
... Show MoreMicrosporum canis is considered one of the filamentous fungi that cause surface fungal contagion in the humans and animals. The present study aimed to diagnose M. canis via the molecular method and differentiating its local Iraqi isolates from global isolates. Microscopic examination showed 55 specimens with M. canis from 130 specimens collected from children aged between 4-10 years suspected of dermatophytes who attended Medical City Laboratories and Baghdad Hospital in Baghdad city from 1/12/2022 to 1/3/2023. The results showed that the frequency of M. canis infections was 55/130 (42.31%). The results demonstrated significant differences in the animals' contact (p <0.0001), lesio
... Show MoreMultiple sclerosis (MS) is the result of a complex interaction between environmental factors and genetic predisposition.
Epstein-Barr virus (EBV) is a significant environmental risk factor associated with MS. Human- beta defensin 2 (HβD-2) is a crucial innate immune response proteint that as an inflammatory marker protects humans from pathogens invading the body like viruses. Therefore, a case-control study was conducted on 90 subjected (48 patients with MS and 42 healthy controls) to examine the role of HβD-2 in EBV viral load infection and MS patients. An enzyme-linked immunosorbentassay kit was used to measure HβD-2 levels in serum. The viral load of EBV was determined using a real-time PCR. The findings revealed that medi
... Show MoreSpontaneous abortion (SA) is a sever disease in which a women losses her foetus usually before 24 weeks of the pregnancy. About 10% -50% of pregnancy cases are run out with SA for reasons related with women's age and health. This condition occurrence may increases if the patient has a history of bacterial vaginosis. This study aimed at the characterization and isolation of vaginal microbiota generally and highlight on commensal bacteria becoming opportunistic when circumstances are favourable. From October to December 2022, about 100 samples were collected, 50 specimens from women with SA and 50 specimens from healthy pregnant outcomes (control). The high vaginal swabs samples were collected from Babylon Teaching Hospital for Maternity a
... Show MoreEngineered nanomaterials are so tiny that they cannot be seen without special equipment; they are found in many industrial products today, consumer products, medicines, and food products. The small size and other properties of nanomaterials can make them very hazardous to human health. Magnesium oxide nanoparticles (MgO NPs), or metal oxides, have several advantages compared to other metal oxide nanoparticles because of their properties. Therefore, multiple uses of MgO NPs put human health at risk from prolonged exposure. The study aimed to determine how treatment with oral doses of MgO nanoparticles affects the kidneys of male rats through the oral route at 250 and 1000 mg/kg for 14 days, 28 days, and 56 days, respectively. Sixty mature
... Show MoreThe goal of this research is to define the convergent sequence in A-random approach space and sequentially convergent are discussed and the cluster point, open and closed ball and linear transformation. We are going to explain a new structure of Random approach normed space via Banach space in and discussed all the relations between metric space in this research.
This work is concerned with the synthesis of two types of composites thin films (Sb2O3:WO3 and (Sb2O3:In2O3) with different concentrations (0.0,0.05,0.1, and 0.15). The prepared thin films are characterized with the use of the X-ray diffraction atomic force microscope AFM and UV-Vis–infrared spectrophotometer. The structural examination shows that both composite's thin films were polycrystalline with nano size with cubic phase as majority and orthorhombic phase as minority phase. The crystal size decreases from 34.6 to 24.7 and 21.7 nm for (Sb2O3:WO3) and (Sb2O3:In2O3
... Show MoreThis paper describes a hybrid grayscale compression system based on the discrete wavelet transform (DWT) and a polynomial coding technique for mixing quantization schemes to increase the compression ratio while maintaining quality. The proposed compression system consists of three main steps: first, decomposing an image using a three-level DWT; second, applying the 2-D linear polynomial coding technique to the approximation sub-band; and third, dividing the detailed sub-bands of each level into the Most Significant Value (MSV) and Least Significant Value (LSV), where the former is compressed using iterative scalar uniform quantization and the latter by soft quantization thresholding. For testing the performance of the suggested compressi
... Show MoreThe study of the relationship between the coordinates of the sun and the moon with the crescent visibility factors has not been previously treated in a detailed and accurate way in research and previous studies, despite its religious importance. Accordingly, this paper aims to study the relationship between the crescent visibility factors (age, lag time, elongation (ARCL), arc of vision or relative altitude (ARCV), relative azimuth (DAZ), and crescent width (W), with coordinates of the sun and the moon), and how it varies during the day of the crescent's observation. In this paper, Matlab programs were designed to calculate the ecliptic sun and moon coordinates (λ, β) and in the presence of all perturbation impacts (planets), then co
... Show MoreIn this research, we introduce the concepts of -module where (i=1,2,3), as proper generalizations of -conditions, where (i=1,2,3). The relationships between these concepts and previous ones were explained, and a comprehensive description of each was provided. Additionally, by relying on -module, new concepts were developed, such as supplement continuous and quasi-supplement continuous, which represent generalizations of continuous and quasi-continuous. Illustrative examples were provided, and the possibility of their inheritance was discussed.
This paper proposes a new approach for image data hiding that aims to improve both robustness and imperceptibility. The proposed approach is based on a texture-adaptive quantization index modulation (QIM) method that takes into account the local characteristics of the image texture to optimize the embedding process. The approach is evaluated using various image datasets and compared to existing state-of-the-art techniques. The results show that the proposed approach achieves better performance in terms of robustness against various image processing attacks, with BERs of zero in some attacks, while maintaining a high level of imperceptibility with PSNRs exceeding 46 decibels. It can be deduced that adaptation and normalization
... Show MoreDiabetes mellitus is a globally prevalent disease with several parameters that may be involved in diagnosis or altered throughout disease progression. In this study, 120 patients with type 2 diabetes and healthy controls were recruited, with ages ranging from 30-65 years old. The research focused on determining levels of Protein Z (PROZ), Laminin Subunit Alpha 2 (LAMA2), Mixed Lineage Leukemia 4 (MLL4), and Plexin Domain Containing 2 (PLXDC2). Participants were divided into four groups: group I (n=30) with long-term metformin treatment, group II (n=30) with short-term metformin treatment, group III (n=30) newly diagnosed without medication, and group IV (n=30) healthy controls. Protein markers were measured by ELISA, while fasting blood
... Show MoreA few decades ago, quality assessment was a significant challenge in agriculture, even with tiny amounts of agricultural products. They are subject to diseases, pesticides, and environmental variables that have led to challenges to quality and safety. The quality evaluation of these items serves a crucial function in quality control and increases productivity before consumption. This paper proposes a deep neural network for solving Indian tomato diversity problems based on the assessment of their features. This study was carried out using four different categories of south Indian cherry tomatoes, i.e., spot, BER, calyx, and n
... Show MoreIn response to the growing interest in green chemistry and the adoption of environmentally friendly and cost-effective compounds in industrial and agricultural applications, this study focuses on exploring the potential of natural compounds. Specifically, the research investigates the corrosion inhibitory properties of Iraqi plum tree gum. The natural gum is characterized using Fourier transform infrared spectroscopy to identify its functional groups and atomic force microscopy (AFM) for further analysis. The electrochemical polarization technique was used to study corrosion measurements for carbon steel (C.S) in saline solution and in the presence of the inhibitor (Plum Tree Gum) in different concentration solutions. The findings reveal
... Show MoreMaking use of the geomagnetic field and the electron density data from the ionosphere observed by the three Swarm satellites that were recorded through 2020, 303 days before and 62 days after the Samos earthquake were investigated, which occurred at 11:51 UTC on Oct 30, 2020, happened in an offshore location around 60 km southwest of Izmir, western Turkey, and 16 km north of Samos Island, Greece 37.897°N 26.784°E. Magnetic and electron density data abnormalities were examined using the Analysis of Magnetic Swarm (AMSW) and the Analysis of Electron Density Swarm (AEDSW) algorithms. The quiet time abnormalities during nighttime within the Dobrovisky region showed exciting results. It showed an enhancement in the cumulative number of trac
... Show MoreAlthough deep learning-based object detection has produced excellent performance, there are still many issues with images from real-world capture, including rotating jitter, blurring, and noise deletion. The impact of these issues on object detection is significant. The main goal of this paper is to develop a real-time “You Only Look Once” (YOLOv3) algorithm to detect traffic signs. Compared to all other object detection algorithms, the YOLO method has a number of benefits. In contrast to different algorithms, YOLO looks at the image entirely by making predictions of the bounding boxes utilizing a convolutional neural network (CNN), determining the probability of each class for these boxes, and detecting the image more quickly. The p
... Show MoreWith the enormous growth and advancement of the computer industry, it is critically necessary to transmit a large amount of encrypted multimedia data to prevent third parties from attacking one's privacy or misbehaving. This study proposes a new encryption strategy for preserving original images. It is highly effective and has been shown to be resilient against impulsive noise and loss of data. At first, some random data is entered within the perimeter of the image. Then, three rounds of high-speed scrambling and adaptive diffusion for pixels are carried out to mix the contiguous pixels at random and distribute the newly placed data throughout the image. The suggested encryption method can be used to encrypt original images in any form o
... Show MoreThe COVID-19 pandemic has clasped the world by furore storm. India has been the epicenter of the surge in COVID cases since March 2021 which is being considered as the second wave. With every passing week, new guidelines were being implemented by various states as well as the central government to control the situation. Hospitals were running out of beds, oxygen, and medicinal supply with patients with comorbidities suffering the most. A handful of drugs have been approved for direct or emergency use to counter the situation. However, over time some of these drugs have faced strong backlash for being ineffective and hence are no longer in use. In this review, we shall study various vaccines that have been approved in India and abroad and
... Show MoreThis article presents the theoretical analysis of the nonlinear behavior of the blood flow through an angled arterial segment with overlapping stenosis. A mathematically created time-variant stenosis emerges from the formation of arterial narrowing brought on by atheroma. An elastic cylindrical tube with a moving wall is used to represent the artery, and the Casson liquid is used to simulate blood that flows through it. The nonlinear elements that arise in the equations, govern blood flow are taken into account. The impact of the pulsatile pressure gradient that caused by the regular heartbeat on the flow process in the stenosed artery is demonstrated mathematically. By employing the boundary conditions, the present analytical tech
... Show More