Preferred Language
Articles
/
ABeVoJIBVTCNdQwCyrvP
Study of the reliability of serum vascular endothelial growth factor and its soluble receptor as markers of diabetic nephropathy in type 2 diabetes patients
...Show More Authors

The levels of circulating angiogenic and anti-angiogenic factors, namely vascular endothelial growth factor–A (VEGF-A) and soluble vascular endothelial growth factor receptor-1 (sVEGFR-1), have been linked to the development of renal dysfunction due to the proliferation of microvasculature within the kidneys of type 2 diabetic (T2DM) patients. The study aims to scrutinize serum levels of VEGF and sVEGFR-1 in a sample of Iraqi diabetic nephropathy patients to support their reliability as markers for the prediction of nephropathy in type 2 diabetes mellitus patients as well as to assess the ACE inhibitor’s effect on the levels of these two markers. Method: The ninety participants of this case-control study were split into three groups: thirty-five patients with T2DM and an equal number of patients with DN and the third group involve twenty apparently healthy individuals as the control group. The two diabetic groups have been further divided into four groups according to the ACE inhibitors use. Laboratory measurements involve the glycemic indices, renal function test with serum VEGF-A and sVEGFR-1. Results: the median serum levels of VEGF-A show valuable discrepancies between the three groups (p-value<0.05) but for sVEGFR-1 it doesn’t show a notable difference between the DM and the DN groups only(p-value> 0.05).

Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 23 2015
Journal Name
Nature Communications
A metabolic stress-inducible miR-34a-HNF4α pathway regulates lipid and lipoprotein metabolism
...Show More Authors

View Publication
Scopus (242)
Crossref (241)
Scopus Clarivate Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Iraqi Rural Singing and National Identity: مصطفى عباس السوداني-عبد الحليم أحمد حسن
...Show More Authors

Singing has significant importance being a major basis for the expressive and cultural production of the societies and a real companion that reflects their artistic career and is strongly connected to the reality of the peoples and the production of the individuals, who are geniuses of arts and culture.
Rural singing represents one of the most well-known artistic singing styles in Iraq, which truly embodied the Iraqi national identity. However, it remained confined to the countryside and did not spread due to the lack of mass media and the recording technologies at that time. It has been pure virgin singing art. The theoretical framework is divided into three axes:

• The Iraqi singing heritage in the twentieth century, a hi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 07 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Mathematical connection skills and their relationship with productive thinking among secondary school students
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
An attempt to Stimulate lipids for Biodiesel Production from locally Isolated Microalgae in Iraq
...Show More Authors

Two locally isolated microalgae (Chlorella vulgaris Bejerinck and Nitzschia palea (Kützing) W. Smith) were used in the current study to test their ability to production biodiesel through stimulated in different nitrogen concentration treatments (0, 2, 4, 8 gl ), and effect of nitrogen concentration on the quantity of primary product (carbohydrate, protein ), also the quantity and quality of lipid. The results revealed that starvation of nitrogen led to high lipid yielding, in C. vulgaris and N. palea the lipid content increased from 6.6% to 40% and 40% to 60% of dry weight (DW) respectively.Also in C. vulgaris, the highest carbohydrate was 23% of DW from zero nitrate medium and the highest protein was 50% of DW in the treatment 8gl. Whil

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
13th International Symposium On Fiber-reinforced Polymer Reinforcement For Concrete Structures Frprcs 13
CFRP Repairing System at Openings in Reinforced Concrete T-Beams Cracked by Impact Loads
...Show More Authors