Preferred Language
Articles
/
jbcd-2751
Oxidative stress status in hypertensive patients on amlodipine treatment
...Show More Authors

Background: Oxidative stress may contribute to the etiology of hypertension in humans. Oxidative stress is an imbalance between reactive oxygen species (ROS) and antioxidant defense mechanisms, causing damage to biological macromolecules and dysregulation of normal metabolism and physiology. Amlodipine as an antihypertensive agent is a long-acting calcium channel blocker that dilates blood vessels and improves blood flow. The aim of this study was to assess the oxidative stress in hypertensive patients on Amlodipine treatment through the assessment of salivary Malondialdehyde (MDA) and superoxide dismutase (SOD) as a marker of oxidative stress.

Material and method: 60 individuals were included in this study, divided into two groups; the first group composed of 30 hypertensive patients on Amlodipine antihypertensive agent. The second group, the control group, composed of 30 healthy subjects without any systemic disease and with almost healthy oral hygiene. Intraoral examination was done for each individual and salivary samples were collected with the salivary flow rate (F/R) which was calculated in ml per minute and pH was measured by pH meter. Salivary MDA and SOD were analyzed by using ELISA kit based on the principle of competitive enzyme immunoassay technique; the concentrations of markers were measured by spectrophotometer at 450nm in a microplate reader.

Results: Salivary MDA was significantly higher in hypertensive patients compared to control, while salivary SOD was significantly lower in patients than control group. Salivary flow rate and pH was significantly lower in patients as compared to the control group.

Conclusions: There is a relation between oxidative stress and hypertension. Salivary MDA and SOD can be used as potential marker for monitoring patients with Hypertension.

Keywords: hypertension, Oxidative stress, Amlodipine, MDA and SOD

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 17 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Interdisciplinary Mathematics
On Tˉ-pure sub-acts over moniods
...Show More Authors

The notion of a Tˉ-pure sub-act and so Tˉ-pure sub-act relative to sub-act are introduced. Some properties of these concepts have been studied.

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Sun Mar 01 2009
Journal Name
The Third International Conference Of The College Of Science –university Of Baghdad
On Maximal solution of nonlinear operator equation
...Show More Authors

Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor

... Show More
Publication Date
Fri Apr 25 2014
Journal Name
Journal Of Kufa For Nursing Science
Environmental Effects On Women's With Spontaneous Abortion
...Show More Authors

Background: spontaneous abortion constitutes one of the most important adverse pregnancy outcomes affecting human reproduction, and its risk factors are not only affected by biological, demographic factors such as age, gravidity, and previous history of miscarriage,but also by individual women’s personal social characteristics, and by the larger social environment. Objective:To identifyEnvironmental effects on Women's with Spontaneous Abortion. Methodology:Non-probability(purposive sample)of(200) women, who were suffering from spontaneous abortion in maternity unitfrom four hospitals at Baghdad City which include Al-ElwiaMaternity Teaching Hospital, and Baghdad Teaching Hospital at Al-Russafa sector. Al–karckhMaternityHospita

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
On Training Of Feed Forward Neural Networks
...Show More Authors

In this paper we describe several different training algorithms for feed forward neural networks(FFNN). In all of these algorithms we use the gradient of the performance function, energy function, to determine how to adjust the weights such that the performance function is minimized, where the back propagation algorithm has been used to increase the speed of training. The above algorithms have a variety of different computation and thus different type of form of search direction and storage requirements, however non of the above algorithms has a global properties which suited to all problems.

View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Adsorption Study for Trifluralin on Iraqi ? –Alumina
...Show More Authors

Equilibrium adsorption isotherm for the removal of trifluralin from aqueous solutions using ? –alumina clay has been studied. The result shows that the isotherms were S3 according Giels classification. The effects of various experimental parameters such as contact time, adsorbent dosage, effect of pH and temperature of trifluralin on the adsorption capacities have been investigated. The adsorption isotherms were obtained by obeying freundlich adsorption isotherm with (R2 = 0.91249-0.8149). The thermodynamic parameters have been calculated by using the adsorption process at five different temperature, the values of ?H, ?G and ?S were (_1.0625) kj. mol-1, (7.628 - 7.831) kj.mol-1 and (_2.7966 - _2.9162) kg.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More