Preferred Language
Articles
/
bsj-2913
Level of uric acid and its, relationship with lipid peroxidation in sera of patients with acute coronary syndrome
...Show More Authors

Unstable angina pectoris often leads to acute myocardial infarction. Since uric acid is thought to be risk factor for cardiovascular disease and considered a major antioxidant in human blood .The level of uric acid and lipid peroxidation in the sera of patients with unstable angina and myocardial infarction were measured and compared to the healthy individuals. Twenty-nine patients with unstable angina and twenty-nine patients with myocardial infarction were studied and compared to twenty-five healthy individuals. Uric acid was measured by using Human Kit. Malondialdelyde (MDA) a lipid peroxidation marker, was measured by thiobarbituric acid method .Significant elevation of uric acid and MDA were observed in the sera of patients with unstable angina and myocardial infarction compared to the control group , while a non significant correlation between uric acid and lipid peroxidation were found in the present study in the sera of patients with unstable angina and myocardial infarction.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 16 2016
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
MINIMIZING WAITING TIMES USING MULTIPLE FUZZY QUEUEING MODEL WITH SUPPLY PRIORITIES
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of Nano Research
Electroluminescence Devices from Quantum Dots with TPD Polymer White Light Generation
...Show More Authors

Quantum dots of CdSe, CdS and ZnS QDs were prepared by chemical reaction and used to fabricate organic quantum dot hybrid junction device. QD-LEDs were fabricated using ITO/TPD: PMMA/CdSe/Al, ITO/TPD: PMMA/CdS/Al and ITO/TPD: PMMA/ZnS/Al QDs devices which synthesized by phase segregation method. The hybrid white light emitting devices consists, of two-layers deposited successively on the ITO glass substrate; the first layer was of N, N’-bis (3-methylphenyl)-N, N’-bis (phenyl) benzidine (TPD) polymer mixed with polymethyl methacrylate (PMMA) polymers in ratio 1:1, while the second layer was 0.5wt% from each type of the (CdSe, CdS and ZnS) QDs for each device.The optical properties of QDs were characterized by UV-Vis. and photolum

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Mar 09 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Dental anomalies associated with malocclusion among 13 year old Kurdish students
...Show More Authors

Background: The aim of this national oral health survey was to determine the prevalence of malocclusions due to some anomalies in the dentition among the 13 years old Kurdish students in sulaimani intermediate school. Materials and methods: The total sample was 950 (455 males and 495 females) which assessed by diagnostic set and special instrument. The clinical examination was mainly based on the definitions of Björk et al. Some variables were recorded as present or absent sometimes denoting the tooth or the teeth involved in malocclusion and their distribution according to the whole sample. Results: The results showed that 1)The most common extracted tooth was the mandibular first molar (2.9%). 2) At this age group the most common partial

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Teen-Computer Interaction: Building a Conceptual Model with Thoughts- Emotion-Behaviour
...Show More Authors

Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application
...Show More Authors

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Parametric Nonlinear Programming Approach with Fuzzy Queues Using Hexagonal Membership Functions
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
A multivariate Bayesian model using Gibbs sampler with real data application
...Show More Authors

In many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 15 2018
Journal Name
The Journal Of Immunology
Extracellular Histones Inhibit Complement Activation through Interacting with Complement Component 4
...Show More Authors
Abstract<p>Complement activation leads to membrane attack complex formation, which can lyse not only pathogens but also host cells. Histones can be released from the lysed or damaged cells and serve as a major type of damage-associated molecular pattern, but their effects on the complement system are not clear. In this study, we pulled down two major proteins from human serum using histone-conjugated beads: one was C-reactive protein and the other was C4, as identified by mass spectrometry. In surface plasmon resonance analysis, histone H3 and H4 showed stronger binding to C4 than other histones, with KD around 1 nM. The interaction did not affect C4 cleavage to C4a and C4b. Because histones bin</p> ... Show More
View Publication
Scopus (23)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Baghdad Science Journal
Densenet Model for Binary Glaucoma Classification Performance Assessment with Texture Feature
...Show More Authors

تعتبر شبكية العين جزءًا مهمًا من العين لأن الأطباء يستخدمون صورها لتشخيص العديد من أمراض العيون مثل الجلوكوما واعتلال الشبكية السكري وإعتام عدسة العين. في الواقع، يعد تصوير الشبكية المجزأ أداة قوية للكشف عن النمو غير العادي في منطقة العين بالإضافة إلى تحديد حجم وبنية القرص البصري. يمكن أن يؤدي الجلوكوما إلى إتلاف القرص البصري، مما يغير مظهر القرص البصري للعين. تعمل تقنيتنا على الكشف عن الجلوكوما وتصنيفه

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref