Preferred Language
Articles
/
injns-165
Detection the level of YKL-40 biochemical marker and vitamin D level in sera of Iraqi Uterine cancer females' patients
...Show More Authors

Objective: Detection the level of YKL-40 biochemical marker and vitamin D level in sera of Iraqi uterine cancer
females' patients.
Methodology: This study included 90 female volunteers, 30 of them were healthy volunteers who were
considered as a control group, while sixty serum samples were collected from women patients suffering from
uterine tumors (30 malignant and 30 fibroid benign tumors), benign cases were considered as a disease
control group for malignant tumors. The average age of those females was 30-75 years, which matched the
control group. All the samples were collected from Azady hospital in Kirkuk and the gynecologic department at
Medical City in Baghdad during October /2012 to May /2013. All the serum samples were undergone
biochemical estimation for the levels of YKL-40, and 25 (OH) vitamin D using ELISA technique, and BMI data
were collected.
Results: Estimation of YKL-40 levels showed that there were 28 No. (93.33%) of EC patients had high level of
YKL-40, while 26 no. (86.67%) of fibroid (benign tumor) patients had low level, and 15(50.00 %) of healthy
control had low. There was a significant difference found in YKL-40 level in EC patients when compared with
the fibroid (benign tumor) patients and healthy control (Pvalue= 0.0001), (Pvalue= 0.0001) respectively. The
highest percent of women with EC and the women with fibroid (benign tumor) had deficiency of 25 (OH)
vitamin D levels (66.67%). While the highest percent of healthy control had sufficiency of 25(OH) vitamin D
level (56.67%). statistically there was significant difference among study groups (p=0.0001). Were as no
significant difference between EC patients and fibroid (benign tumor) patients (P-value =0.822).
Recommendations: Comparing between the ykl-40 marker and other tumor marker diagnostic levels in the
detection of uterine tumors. For further studies, we recommended study the diagnostic levels of ykl-40
marker and its correlation with other body tumors. It is recommended to do estimation of vitamin D levels
with more advanced method and correlation of its with disease.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue May 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The frontal sinus dimensions in mouth and nasal breathers in Iraqi adult subjects
...Show More Authors

Background: The frontal sinus area can be used as a diagnostic aid to recognize mouth breather subjects. The aims of this study were to determine the gender difference in each group, to compare the frontal sinus area between mouth breather and nasal breather group, and to verify the presence of correlation between the frontal sinus area and the cephalometric skeletal measurements used in this study. Materials and Methods: Cephalometric radiographs were taken for 60 adults (30 mouth breathers and 30 nasal breathers) age range (18-25), for each group 15 males and 15 females, in the orthodontic clinic in the college of Dentistry at Baghdad University. The control group (nasal breather) with skeletal class I and ANB angle ranged between 2-4º,

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Phytochemical Study of Cynara scolymus L. (Artichoke) (Asteraceae) Cultivated in Iraq, Detection and Identification of Phenolic Acid Compounds Cynarin and Chlorogenic Acid
...Show More Authors

The leaves of globe artichoke, Cynara scolymus Family Asteraceae/ compositea have long – used in traditional medicine and now included in British and European Pharmacopeia, the British Harbal Pharmacopeia and complete German Commission E monographs.The plant originally comes from Mediterranean region and North Africa and cultivated around the world. The flowers are used worldwide for nutrition purposes and the leaves for medical purposes including hepatic affections. The plant wildly distributed in Iraq in the watery lines and boundary of the field.The plant contains many phytochemicals such as the bitter phenolic acids whose choleretic and hypocholestremic as these compounds are antioxidant. Other materials to h

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Jan 02 2024
Journal Name
Eximia Journal
The role of strategic Renewal in organizational immunity - analytical research in the Iraqi Ministry of Education
...Show More Authors

The current study aims to demonstrate the role of strategic renewal in enhancing organizational immunity through strategic renewal mechanisms represented by (Reanimating, Rejuvenation, Venturing, and restructuring). The main idea of this study relates to the extent to which organizations’ immunity is achieved through strategic Renewal mechanisms, by measuring these dimensions with Organizational immunity represented by organizational learning, organizational memory, and organizational DNA. The study population was the headquarters of the Iraqi Ministry of Education, and the sample included (330) individuals from the upper, middle, and lower leadership levels. Several statistical methods were used to deal with the results of the questionna

... Show More
Publication Date
Fri Dec 13 2024
Journal Name
Journal Of Economics And Administrative Sciences
The role of strategic sensitivity in organizational immunity - analytical research in the Iraqi Ministry of Education
...Show More Authors

The current research aims to find out the effect of strategic sensitivity in enhancing organizational immunity at the leadership levels in the Iraqi Ministry of Education, as the strategic sensitivity variable includes two dimensions (strategic foresight and strategic Insight), and the organizational immunity variable addresses three dimensions (organizational learning, organizational memory and organizational DNA). The main purpose of this research was related to the extent to which the Ministry’s immunity was achieved through the role played by strategic sensitivity. A sample of (349) individuals was selected . The questionnaire was relied upon to collect data, and the number of questionnaires suitable for analysis was (330). Re

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences &amp; Humanities
The Effect of Cloud Computing in Facing the Challenges of Applying IFRSs in Iraqi Private Banks
...Show More Authors

The research aims to explain the role of cloud computing technology in facilitating the application of international financial reporting standards in Iraqi banks, by preparing a checklist that included a set of paragraphs to measure the level of application of IFRSs. In those banks and then the need to use cloud computing technology, and the researchers reached a set of conclusions, including, that cloud computing technology has a role in facilitating the application of international financial reporting standards in the banks, the research sample, because of the ease it provides in preparing and saving accounting information and the possibility of accessing it in any time and from any place where the Internet service is available. T

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Improvement of the Fault Tolerance in IoT Based Positioning Systems by Applying for Redundancy in the Controller Layer
...Show More Authors

In recent years, the positioning applications of Internet-of-Things (IoT) based systems have grown increasingly popular, and are found to be useful in tracking the daily activities of children, the elderly and vehicle tracking. It can be argued that the data obtained from GPS based systems may contain error, hence taking these factors into account, the proposed method for this study is based on the application of IoT-based positioning and the replacement of using IoT instead of GPS.  This cannot, however, be a reason for not using the GPS, and in order to enhance the reliability, a parallel combination of the modern system and traditional methods simultaneously can be applied. Although GPS signals can only be accessed in open spaces, GP

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of SPAWN Strategy on the Life Skills among the Second Grade Intermediate Students
...Show More Authors

The aim of the research is to find out the effect of the SPAWN strategy on the life skills of second-intermediate-grade students. This study stage represented the research community within the intermediate and secondary governmental daytime schools affiliated with the Directorate of Education of Diwaniyah. The experiment was applied in Al-Razai Intermediate School on a sample of second-grade intermediate students, including 66 students distributed into two groups: (32) students within the experimental group and (34) students within the control group. The two groups were equivalent with a number of variables (chronological age, intelligence test, previous information test, life skills scale). The results indicated that the two groups were

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Evaluating the Inhibitory Activity of Apigenin Extracted from Salvia officinalis leaves on the Growth of L20B Cancer Cell Line
...Show More Authors

The study aimed to evaluating the inhibitory activity of apigenin extracted from Salvia officinalis leaves on the growth of L20B cancer cell in vitro, and through two incubation periods; 48 and 72 hours. Accordingly, eight concentrations (1.56, 3.13, 6.25, 12.5, 25.0, 50.0, 100.0 and 200.0 micromol) of apigenin and similar concentrations of vitamin C and carbon tetrachloride (CCl4) were tested. The apigenin revealed its significant inhibitory potentials against the growth of L20B cell line, especially at the low concentrations (1.56, 3.13 and 6.25 micromol) and at 72 incubation period in comparison with vitamin C and CCl4.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref