Preferred Language
Articles
/
bijps-520
Detection of Carbohydrate Antigen CA19-9 Levels in Sera and Tissues' Homogenate of Breast and Thyroid Benign Cases
...Show More Authors

         The aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid tumor patients than control group. The results of CA19-9 levels in tissues' homogenate were (356.2 ±173.75 and 20 ±14.4)U/ml respectively. The results were found to be highly significant in tissues' homogenate of breast tumor patients and non significant in thyroid tumor patients of higher compare with the it's serum levels of the same patients groups.  

Key words: Carbohydrate antigen CA19-9, Benign Cases  and  CA19-9, Breast tumor  and CA19-9, Thyroid tumor  and  CA19-9.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Levels of Geometrical Thinking of The Students of Mathematic Department in Basic Education College at AL- Mustansiriyah University
...Show More Authors

This  research aimes to expose the levels of geometrical thinking among the students of mathematic department in Basic Education College at AL-Mustansiriyah University throughout their respondes on the test of  geometrical thinking which consists (50) multi- choice items  distributed on the first four levels of Van Hiele ( recognition – analysis – ordering – deduction ).

The validity and the reliability of the test have been investigated. Besides, the difficulty and its discrimination have been measured. The activity of the wrong variables has been measured.

The test has been applied on (180) male and female students of the first, second and third grades.

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Bionatura
Gene expression of a nitrogen tolerance gene ZmNR1 under the influence of different levels of nitrogen in maize
...Show More Authors

A field experiment was carried out in the College of Agricultural Engineering Sciences - University of Baghdad, during the fall season of 2021 to find out which cultivated cultivars of maize are efficient under nitrogen fertilization. The experiment was applied according to an RCBD (split-plot design with three replications). The cultivars of the experiment (Baghdad, 5018, Sarah) supply three levels of nitrogen fertilizer, which are N1 (100 kg.N/ha), N2 (200 kg.N/ha) and N3 (300 kg.N/ha). The statistical analysis results showed the superiority of the Sarah genotype, which gave the highest value of SOD and CAT enzymes, reaching 11.59 units mg-1 and 10.76 units mg-1 . Protein sequentially, while cultivar5018 outperformed as it gave th

... Show More
View Publication
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Heavy Metal Complexes of 1, 2, 3-Triazole derivative: Synthesis, Characterization, and Cytotoxicity Appraisal Against Breast Cancer Cell Lines (MDA-MB-231)
...Show More Authors

     New chelating ligand derived from triazole and its complexes with metal ions Rhodium, Platinum and Gold were synthesized. Through a copper (I)-catalyzed click reaction, the ligand produced 1,3-dipolar cycloaddition between 2,6-bis((prop-2-yn-1-yloxy) methyl) pyridine and 1-azidododecane. All structures of these new compounds were rigorously characterized in the solid state using spectroscopic techniques like: 1HNMR, 13CNMR, Uv-Vis, FTIR, metal and elemental analyses, magnetic susceptibility and conductivity measurements at room temperature, it was found that the ligand acts as a penta and tetradentate chelate through N3O2, N2O2, and the geometry of the new complexes are identified as octahedral for (Rh & Pt) complexes a

... Show More
Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Heavy Metal Complexes of 1, 2, 3-Triazole derivative: Synthesis, Characterization, and Cytotoxicity Appraisal Against Breast Cancer Cell Lines (MDA-MB-231)
...Show More Authors

     New chelating ligand derived from triazole and its complexes with metal ions Rhodium, Platinum and Gold were synthesized. Through a copper (I)-catalyzed click reaction, the ligand produced 1,3-dipolar cycloaddition between 2,6-bis((prop-2-yn-1-yloxy) methyl) pyridine and 1-azidododecane. All structures of these new compounds were rigorously characterized in the solid state using spectroscopic techniques like: 1HNMR, 13CNMR, Uv-Vis, FTIR, metal and elemental analyses, magnetic susceptibility and conductivity measurements at room temperature, it was found that the ligand acts as a penta and tetradentate chelate through N3O2, N2O2, and the geometry of the new complex

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed May 18 2016
Journal Name
Al-academy
The Role of T.V. Shaws in Transmitting Violence in Children: An Analytic Study for T.V. Chanels for Children During 1/3/2014 – 1/9/2014: يوسف محمد حسين
...Show More Authors

Our study comes up to clarify the role of television in spreading the culture of violence with a child. This study represents one of the important studies that have tried to highlight the impact of these programmes, particularly cartoons, on the child's behaviors, actions and acquired habits.Violence considers a common phenomenon among the people, as the role of the media, particularly TV has a vital role due to its properties, characteristics and its significant impact on different segments and groups in society and in children particularly through exposure to programmes of films.The results of the study have been affected by the rising proportion of females to males, and that the contribution of real life has a big role in the child ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref