Preferred Language
Articles
/
-hdkwpEBVTCNdQwCPpnq
Pathogenesis of periodontitis – A potential role for epithelial-mesenchymal transition
...Show More Authors

Epithelial mesenchymal transition (EMT) is a process comprising cellular and molecular events which result in cells shifting from an epithelial to a mesenchymal phenotype. Periodontitis is a destructive chronic disease of the periodontium initiated in response to a dysbiotic microbiome, and dominated by Gram-negative bacteria in the subgingival niches accompanied by an aberrant immune response in susceptible subjects. Both EMT and periodontitis share common risk factors and drivers, including Gram-negative bacteria, excess inflammatory cytokine production, smoking, oxidative stress and diabetes mellitus. In addition, periodontitis is characterized by down-regulation of key epithelial markers such as E-cadherin together with up-regulation of transcriptional factors and mesenchymal proteins, including Snail1, vimentin and N-cadherin, which also occur in the EMT program. Clinically, these phenotypic changes may be reflected by increases in microulceration of the pocket epithelial lining, granulation tissue formation, and fibrosis. Both in vitro and in vivo data now support the potential involvement of EMT as a pathogenic mechanism in periodontal diseases which may facilitate bacterial invasion into the underlying gingival tissues and propagation of inflammation. This review surveys the available literature and provides evidence linking EMT to periodontitis pathogenesis.

Scopus Clarivate Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
Post-interactive communication A study to build a model for the flow of communication in social networking sites
...Show More Authors

The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.

The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Transformational Leadership Dimensions and Its Role in the Rationalization of Banking Decisions: An Exploratory Esearch of the Views of A Sample of the Officials In the Iraqi Private Banks
...Show More Authors

The current research aims to find out the role of transformational leadership in decision-making wise, to cope with the decline in some of the banking performance indicators as a result of the absence of the modern concept of the leadership of those so-called B (Transformational Leadership) and preventing benefit from the advantages in the banks, and I test the research on a sample of the Iraqi private banks through applied to a sample (77) Mdermvud and Associate Director and Advisor to the Chairman of the Department, the distributors (7) banks, and used the head of the questionnaire as a tool to collect data and information. For the purpose of access to the results, the research sought to test two hypotheses two main hypotheses sub pop

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Role of External Audit in Limiting Creative Accounting Practices in Light of International Standards from The Point of View of Certified Accountancy Experts in Iraq as a Model
...Show More Authors

This research aims to solve a problem in the field of accounting and financial knowledge in the world today, that is, the problem of creative accounting. Especially after the global financial crisis and the collapse of many large companies in the world, people find that they use creative accounting methods to distinguish them from reality, showing the results of their activities and their financial status. This research discusses the concept of creative accounting, the most important methods used in financial statements and its relationship with external auditing, and procedures to limit accounting creativity. This study uses descriptive analysis methods after confirming its theoretical aspects in practice. Using the statistical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model for Using a Students Attendance Management Information Systems/ A Case Study In Lebanese French University/ Erbil
...Show More Authors

This study aims to design unified  electronic information system to manage students attendance in Lebanese French university/Erbil, as a system that simplifies the process of entering and counting the students absence, and generate absence reports to expel students who passed  the acceptable limit of being absent, and by that we can replace the traditional way of  using papers to count absence,  with  a complete electronically system for managing students attendance, in a way that makes the results accurate and unchangeable by the students.

            In order to achieve the study's objectives, we designed an information syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
2008 15th Asia-pacific Software Engineering Conference
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

View Publication
Scopus (16)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Computers, Communications, Control And Systems Engineering
A Framework for Predicting Airfare Prices Using Machine Learning
...Show More Authors

Many academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref