Preferred Language
Articles
/
jbcd-3146
Assessment of salivary immunoglobulin A, interleu-kin-6 and C-reactive protein in chronic kidney dis-ease patients on hemodialysis and on conservative treatment
...Show More Authors

Background: Chronic kidney disease is a gradual loss of kidney function with diabetes and hypertension as the leading cause. Chronic kidney disease is one of these systemic diseases that can affect salivary contents. Aims: This study aimed to assess salivary immunoglobulin A, interleukin-6 and C- reactive protein in chronic kidney disease patients on hemodialysis and those on conservative treatment in comparison with control subjects. Materials and methods: Ninety subjects were included in this study divided into three groups: 30 patients with chronic kidney disease on hemodialysis for at least 6 months ago; 30 patients with chronic kidney disease on conservative treatment and 30 healthy control subjects. Secretory immunoglobulin A, interleukin-6 and C- reactive protein in saliva samples were measured by enzyme-linked immunosorbent assay ELISA. Results: No significant difference in salivary immunoglobulin A level among study groups was seen. A significant increase in salivary interleukin-6 and C- reactive protein in both chronic kidney disease patients on hemodialysis and those on conservative treatment compared to the control group. While, no significant salivary IL-6 and CRP differences were seen between both patient groups, on hemodialysis and conservative treatment. Conclusions: There was no significant difference among chronic kidney disease patients on hemodialysis, on conservative treatment and control healthy subjects regarding to salivary IgA while Salivary interleukin -6 and C- reactive protein was significantly higher in chronic kidney disease patients on hemodialysis and those on conservative treatment compared to healthy subjects.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 23 2022
Journal Name
F1000research
Association between polymorphisms within the gene coding for tumor necrosis factor (TNF)-alpha with outcomes of treatment in a sample of Iraqi patients with ankylosing spondylitis taking etanercept: an observational study
...Show More Authors

Background:Ankylosing spondylitis (AS) is a progressive, chronic inflammatory illness with an unclear etiology that explicitly targets the vertebral column, peripheral joints, and extraarticular tissues. The purpose of this research was to investigate if the existence of single nucleotide polymorphisms (SNPs) in the promoter region of the tumor necrosis factor-alpha (TNF-α) gene at positions -1031T/C (rs199964), -857C/T (rs1799724) and -806C/T (rs4248158) in a sample of Iraqi AS patients could influence the patients' outcomes with etanercept.

Methods:Sixty patients with established AS receiving only etanercept were selected to enroll in this study, with a mean age of 40.75±8.6

... Show More
Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 25 2024
Journal Name
African Journal Of Biological Sciences
Toxic effect of Thiamethoxam and Lambda cyhalothrin on Nephrotoxicity and Hematological in rats
...Show More Authors

Thiamethoxam is a synthetic organic insecticide belong to The most significant new class of pesticides created in the last thirty years is neonicotinoids. This study's objective was to determine the effect of thiamethoxam, lambda cyhalothrin and their combination on biochemical parameters, the levels of free radicals and enzymes activities liver of male.Forty Rats ( 150-170 g ) were used. animals Were separated into four groups, each with ten rats.The Gp1 was used as control, the Gp2 was used to study the effect of thiamethoxam for 3weeks, the Gp3 was employed to examine the impact of lambda cyhalothrin for 3 weeks and the Gp4 was used to research the impact of thiamethoxam and lambda cyhalothrin for 3 weeks. thiamethoxam and/or lambda cyha

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 27 2024
Journal Name
Caspian Journal Of Environmental Sciences,
Morphological study on the form and number of eyes in scorpions and spiders
...Show More Authors

Scorpions and spiders belong to the class Arachnida in phylum Arthropoda. Scorpions are easily distinguished by median eyes on obvious the center of the carapace and have one pair, and lateral eyes have 2-8 in some species. Scorpions do not have good eyesight so the median eyes have always been simple and they are more sensitive than the lateral pairs. They have anterior median eyes (AME) with narrow field of view and pairs of lateral eyes (LE) with more sensitivity and response to light. Family Buthidae have 2-6 lateral eyes in Compsobuthus Mesobuthus, Hottentotta, while Vaejovidae, Chactidae and Chaerilidae have 2 pairs of lateral eyes. In addition, 3 pairs are found in Orthochirus and Androctonus. Spiders have six eyes in family Pholicid

... Show More
View Publication
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Geopolitical dimensions to build a dam on the downstream Renaissance (Egypt and Sudan)
...Show More Authors

Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref