Background Type two diabetes (T2DM) is characterized by insufficient insulin production and secretion. Additionally, the body develops insulin resistance which affects 90–95% of diabetics. Complex cytokines, receptors, genetic pathways, and the immune system are involved in T2DM. Interleukin-18 (IL-18) is one of the inflammatory cytokines associated with Type 2 diabetes. Environmental and genetic variables, including genetic polymorphisms, can increase T2DM risk and its consequences. Single nucleotide gene polymorphisms (SNPs) are important risk factors for diabetes that can be used to find the disease early and treat it better. Objective This study aimed to determine the levels of IL-18 in the serum of Iraqi patients with Type 2 diabetes
... Show MoreThe study was carried out to determine the cytotoxic, antioxidant and gastro-protective effect of ethyl-4-[(3,5-di-tert-butyl-2-hydroxybenzylid ene)amino] benzoate (ETHAB) in rats.
Disabled people are among the most important groups that need attention, care, and financial and moral care. They cannot fulfill the requirement of life normally without care from a person to meet their special needs. The disability is either mental or physical. The Iraqi government has paid attention to this category by adopting a law for this category, represented by Law No. (38) for the year (2013), which keeps their rights and duties in Iraqi society by establishing institution of persons with disabilities and special needs of the Ministry of Labor and Social Affairs to create a modern society politically, socially, culturally or economically. In view of the importance of this group in society, the media reinforces the communit
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreThe assessment of data quality from different sources can be considered as a key challenge in supporting effective geospatial data integration and promoting collaboration in mapping projects. This paper presents a methodology for assessing positional and shape quality for authoritative large-scale data, such as Ordnance Survey (OS) UK data and General Directorate for Survey (GDS) Iraq data, and Volunteered Geographic Information (VGI), such as OpenStreetMap (OSM) data, with the intention of assessing possible integration. It is based on the measurement of discrepancies among the datasets, addressing positional accuracy and shape fidelity, using standard procedures and also directional statistics. Line feature comparison has been und
... Show MoreThe automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show MoreSimple, rapid and sensitive spectrophotometric method was proposed for the analysis of metoclopramide hydrochloride (MPH) in pure form as well as in pharmaceutical tablets. The method is based on the diazotization reaction of MPH with sodium nitrite in hydrochloric acid medium to form diazonium salt, which is coupled with 1-naphthol in sodium hydroxide medium to form azo dye, showing absorption maxima at 550 nm. Beer’s law is obeyed in the concentration range of 0.4 – 18 µg mL-1 of MPH with detection limit 0.5448 µg mL-1. The molar absorptivity and Sandell’s sensitivity are 3.4969 × 104 L mol-1 cm-1 and 0.0101 µg cm-2, respectively. The method was successfully applied to the determination of MPH in pharmaceutical tablets with
... Show MoreThe aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreAbstract:
The research aims to identify the concept of trading securities in Iraq and to propose a new mechanism for the taxation of trading profits and the extent of its impact on tax revenues, as it was observed that there are professional investors in the trading market and some of them achieve huge annual profits. and this profit should be like other taxable profits. The General Commission of Taxes and in cooperation with the Iraq Stock Exchange should identifying those profits, subjecting them to income tax, and adding them to the tax base. The researcher relied on the use of the descriptive and analytical approach bas
... Show More