Considering the expanding frequency of breast cancer and high incidence of vitamin D3 [25(OH)D3] insufficiently, this investigate pointed to explain a relation between serum [25(OH)D3] (the sunshine vitamin) level and breast cancer hazard. The current study aimed to see how serum levels of each [25(OH)D3], HbA1c%, total cholesterol (TC), high density lipoprotein cholesterol (HDL-C), low density lipoprotein cholesterol (LDL-C), and triglyceride (TG) were affected a woman’s risk of getting breast cancer. In 40 healthy volunteers and 69 untreated breast cancer patients with clinical and histological evidence which include outpatients and hospitalized admissions patients at the Oncology Center, Medical City / Baghdad - Iraq. Venous blood samples were withdrawn from breast cancer patients and healthy women between June – Dec., 2020. Serum lipid profiles including [total cholesterol (TC), high-density lipoprotein-cholesterol (HDL-C), low-density lipoprotein-cholesterol (LDL-C), triglycerides (TG)], [25(OH)D3] and HbA1c% were determined under aseptic conditions using a standard fully automatic Chemistry Analyzer. The independent sample t-test was used in the statistical analysis to compare the mean serum levels of lipid profile and other biomarkers determined between breast cancer patients and compared with apparently healthy women. TG, TC, LDL-C, and HDL-C levels are 190. 7 mg/dl, 104.3 mg/dl, 108.1 mg/dl, and 53 mg/dl, respectively. Breast cancer caused a significant increase in serum TC, LDL-C, and TG while decreasing HDL-C significantly. Breast cancer development could be one of the factors causing changes in Vit. D, HbA1c, and lipid profile levels.
This study aimed to explore the manufacture of high-fat pellets for obesity induction diets in male Wistar rats and determined its effect on lipid profiles and body mass index. It was an experimental laboratory method with a post-test randomized control group. Formulation of high-fat pellets (HFD) and physico-chemical characteristics of pellets were conducted in September 2019. This study used about 28 male Wistar white rats, two months old, and 150-200 g body weight. Rats were acclimatized for seven days, then divided into four groups: 7 rats were given a standard feed of Confeed PARS CP594 (P0), and three groups (P1, P2, P3) were given high-fat feed (HFD FII) 30 g/head/day. The result showed that the mean fat content of Formula II pell
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show MoreWe propose a system to detect human faces in color images type BMP by using two methods RGB and YCbCr to determine which is the best one to be used, also determine the effect of applying Low pass filter, Contrast and Brightness on the image. In face detection we try to find the forehead from the binary image by scanning of the image that starts in the middle of the image then precedes by finding the continuous white pixel after continuous black pixel and the maximum width of the white pixel by scanning left and right vertically(sampled w) if the new width is half the previous one the scanning stops.
Adenosine deaminase (ADA; Ec: 3.5.4.4), 5´- Nucleotidase (5´– NT; Ec: 3.1.3.5), and AMP – amino hydrolase (AMP – deaminase AMPDA; Ec: 3.5.4.6) activities were measured in sera of ovarian cancer patients before surgery, and after chemotherapy. The results indicated that ADA specific activity increased significantly (P<0.05), while 5´-NT and AMPDA specific activity decreased significantly (P<0.05) in ovarian cancer patients before surgery in comparison with those of their corresponding control women and benign tumors groups. When the activities of these enzymes were measured after chemotherapy, a significant decrease (P<0.05) in ADA activity, and a significant increase (P<0.05) in 5´- NT and AMPDA activities w
... Show MoreThe aim of this study was to establish the existence and interaction of TMPRSS2 – ERG gene fusion status with clinicopathological features of prostate cancer patients. This research consisted of 123 embedded formalin-fixed tissues obtained from the prostate tumor patients. The above gene fusion is detected through the technique of fluorescent in situ hybridization (FISH) by means of a triple color probe. Seven samples have not been scored due to technical difficulties and 46 patients have fusion (39.6%), while the remaining (70) have not been seen with fusion. Of the 46 fusion-positive, 17 (36%) were caused by ERG-translocation, of the other 29 (63%) were caused by the interstitial segment deletion between the two genes due to the
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More