Preferred Language
Articles
/
bijps-863
Impact of Osteocalcin Level on Vascular Calcification in Type 2 Diabetics in Relation to Fibroblast Growth Factor-23(FGF-23)
...Show More Authors

The present study aimed to assess the potential impact of serum concentration of undercarboxylated osteocalcin (the active form of osteocalcin) and fibroblast growth factor-23 on the incidence of cardiovascular diseases in type 2 diabetics with carotid artery calcification and the possible association with metabolic changes in relation to glucose and minerals homeostasis.

This study included 52 men with carotid artery calcification type 2 diabetes mellitus. These patients were categorized; as follows: group A includes 30 patients who had cardiovascular disease and group B includes 22 patients who had no cardiovascular disease. These groups were compared with 25 apparently healthy control (Group C). 

It has been shown that fasting serum glucose, HbA1c, homeostatic model assessment of insulin resistance and undercarboxylated osteocalcin values were significantly different in group A and B as compared with control. Also, undercarboxylated osteocalcin was negatively correlated with fasting serum glucose and HbA1c in group A and B. Furthermore, mean serum fibroblast growth factor level was significantly different among the three studied groups, with highest levels in group A.

In type 2 diabetic patients with normal kidney function and carotid artery calcification, fibroblast growth factor-23 is associated with cardiovascular disease while undercarboxylated osteocalcin does not. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF NITROGEN FERTILIZERS ON GROWTH AND YIELD TRAITS OF MAIZE: EFFECT OF NITROGEN FERTILIZERS ON GROWTH AND YIELD TRAITS OF MAIZE
...Show More Authors

 

ABSTRACT

A field experiment was carried out in the fields of the college of agricultural engineering sciences, university of Baghdad during the fall season of 2021, in order to find out which of the cultivated genotypes of maize are efficient under nitrogen fertilization. The experiment was applied according to a RCBD (split plot design with three replications). The genotypes of experiment (Baghdad, 5018 and Sarah) and  supplying three levels of nitrogen fertilizer, which are N1 (100 kg/ha),  N2 (200 kg/ha) and N3  (300 kg/ha), the results of the statistical analysis are showed the superiority of the cultivar Sarah in the trait of number of days until 50% silking, chlorophyll

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Correlation between crevicular C-reactive protein level with its serum level in chronic periodontitis patients
...Show More Authors

Background: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Corporate Governance And Organizational Behavior Review
Impact of the electronic internal auditing based on IT governance to reduce auditing risk
...Show More Authors

This paper analysed the effect of electronic internal auditing (EIA) based on the Control Objectives for Information and Related Technologies (COBIT) framework. Organisations must implement an up-to-date accounting information system (AIS) capable of meeting their auditing requirements. Electronic audit risk (compliance assessment, control assurance, and risk assessment) is a development by Weidenmier and Ramamoorti (2006) to improve AIS. In order to fulfil the study’s objectives, a questionnaire was prepared and distributed to a sample comprising 120 employees. The employees were financial managers, internal auditors, and workers involved in the company’s information security departments in the General Company for Electricity D

... Show More
View Publication
Scopus (32)
Crossref (13)
Scopus Crossref
Publication Date
Sat Jul 08 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Estimation of Superoxide Dismutase, Matrix-metalloprotinase-9, and Interleukin -18 in Patients with Type Two Diabetes Mellitus
...Show More Authors

Antioxidant status imbalance and inflammatory process are cooperative events involved in type 2 diabetes mellitus. This study aimed to investigate     superoxide dismutase as a potential biomarkers of antioxidant imbalance, matrix-metaloprotinase-9,   and interleukin -18  as biomarkers of inflammation in serum and to estimate  the effects of other confounding factors  gender, age and finally measuring the relation among the interested biomarkers.

This case - control study included 50 patients,   and   45 of  healthy subjects matched age –gender were also enrolled  in this study as a control group.    The   focused &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
The Impact of Operating System on Bandwidth in Open VPN Technology
...Show More Authors

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Impact of Glycetin Injection on Productive Traits in local Iraqi Chickens
...Show More Authors
Abstract<p>This study aimed to investigate the impact of implementing Glycetin by injection on the productive features of local Iraqi chickens. 100 female hens and 20 roosters from a local Iraqi chicken population, at age 26 weeks. The sample was divided into three groups, in addition to a control group. Each experimental group had 25 female hens, with the same procedure being performed for each individual hen, and 20 roosters, which were reared separately for the purpose of artificial insemination. The avian specimens were housed in separate enclosures, and the experimental conditions were allocated as follows: the initial condition (Control Group) did not receive any injections, whereas condit</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Wed Nov 03 2021
Journal Name
European Journal Of Humanities And Educational Advancements (
Impact of ASSURE Model on Mathematical Correlation and Achievement in Mathematics
...Show More Authors

Publication Date
Mon Mar 07 2022
Journal Name
Construction Research Congress 2022
Impact of Green Construction on Safety Performance in the Built Environment
...Show More Authors

View Publication
Scopus Crossref