Coronary artery disease (CAD) is a major health concern and leading of death in individuals with type 2 diabetes mellitus (T2DM). Glutathione S – Transferase(GST) are known for their broad range of detoxification and in the metabolism of xenobiotics . The role of functional variants of these genes in the development of various disorder is proven. We investigated the possible role of these variants in the development of CAD in T2DM patients. In this case – control study a total of 60 patients (T2DM = 30 ; T2DM – CAD = 30) and 30 controls were included. Serum lipid profiles were measured and DNA was extracted from the blood samples. Multiplex PCR for GSTT1/M1 (present / null) polymorphism, were performed for genotyping of study participants. Gene frequency and lipid profiles were statistically analyzed for disease association. Regression analysis showed that, there was no significant difference of the frequency of GSTT1 (positive /null) genotype and GSTM1 (positive /null) genotype in the 3 study groups . GSTT1 – positive genotype is associated with a 0.51 fold increased ( OR = 0.51 ; 95%CI = 2- 0.1 ;P = 0.321 ) , while the GSTM1 – positive genotype was associated with a 3 fold increase ( OR = 3.06 ; 95%CI=1- 9.7 ; P = 0.055) .We conclude GSTT1 positive genotype considered to be a protective risk from CAD in T2DM patients . The GSTM1 – positive genotype it was considered to be a risk factor of the CAD in T2DM patients.
Deep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
This study thoroughly investigates the potential of niobium oxide (Nb2O5) thin films as UV-A photodetectors. The films were precisely fabricated using dc reactive magnetron sputtering on Si(100) and quartz substrates, maintaining a consistent power output of 50W while varying substrate temperatures. The dominant presence of hexagonal crystal structure Nb2O5 in the films was confirmed. An increased particle diameter at 150°C substrate temperature and a reduced Nb content at higher substrate temperatures were revealed. A distinct band gap with high UV sensitivity at 350 nm was determined. Remarkably, films sputtered using 50W displayed the highest photosensitivity at 514.89%. These outstanding optoelectronic properties highlight Nb2O5 thin f
... Show MoreThis paper presents the first data for bremsstrahlung buildup factor (BBUF) produced by the complete absorption of Y-91 beta particles in different materials via the Monte Carlo simulation method. The bremsstrahlung buildup factors were computed for different thicknesses of water, concrete, aluminum, tin and lead. A single relation between the bremsstrahlung buildup factor BBUF with both the atomic number Z and thickness X of the shielding material has been suggested.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreIn most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show MoreA comparative study was done on the adsorption of methyl orange dye (MO) using non-activated and activated corn leaves with hydrochloric acid as an adsorbent material. Scanning electron microscopy (SEM) and Fourier Transform Infrared spectroscopy (FTIR) were utilized to specify the properties of adsorbent material. The effect of several variables (pH, initial dye concentration, temperature, amount of adsorbent and contact time) on the removal efficiency was studied and the results indicated that the adsorption efficiency increases with the increase in the concentration of dye, adsorbent dosage and contact time, while inversely proportional to the increase in pH and temperature for both the treated and untreated corn leaves. The equi
... Show More