The level of thyroid autoantibodies between type 1 and type 2 diabetes mellitus
patients in Baghdad City were investigated.
Fifty individuals (25 female and 25 male) with type-1 DM in the age group of 10
to 35 years and seventy (35 female and 35 male) of having type-2 DM in the age
group of 33 to 60 years were investigated. A control group of twenty-five nondiabetes
was included. Serum sample collected was used to estimate anti-TPO, TG
and thyroid stimulating hormone antibodies (thyroid stimulating immunoglobulin
TSI and thyrotropin binding inhibitory immunoglobulin TBII) by using enzymelinked
immunosorbent assay (ELISA) technique.
The results show that there is a significant (p< 0.05) increase in the level
Complex detection in protein-protein interaction (PPI) networks is one of the major issues facing scientific study in biological networks. In PPINs, proteins are distributed differently as groups (complexes). These groups can be identified as having a great internal density in the number of edges inside the groups while having the least possible number of edges between these groups. The most common methods for finding such complexes are evolutionary algorithms (EAs), which have been used widely in literature for this objective. Despite the reliability of these complicated detection models, they are mostly based on topological (graph) qualities, and the biological implications of the PPI networks have been rarely explored. In thi
... Show MoreKeratinases are enzymes belonging to the serine hydrolases group which are capable of degradation of keratin, an insoluble and fibrous structural protein widely cross-linked with hydrogen, disulfide, and hydrophobic bonds. Attempts to find new sources of enzymes and amino acids for fundamental knowledge of enzyme evolution, structure‐function relationships, catalysis mechanisms of enzymes, and even for the identification of novel protein folds. In this study, seventy-nine samples were collected from different places in the University of Baghdad, and the best isolate for amino acid production by feathers degradation was by using Streptomyces venezuelae AZ15. The best fermentation system and the optimum culture condit
... Show MoreLet be a unitary left R-module on associative ring with identity. A submodule of is called -annihilator small if , where is a submodule of , implies that ann( )=0, where ann( ) indicates annihilator of in . In this paper, we introduce the concepts of -annihilator-coessential and - annihilator - coclosed submodules. We give many properties related with these types of submodules.
The peristaltic flow of Walter's B fluid through an asymmetric channel is analyzed. The constitutive equation for the balance of mass, momentum, trapped phenomena, and velocity distribution is modeled. Consideration of low Reynolds number and long wavelength assumption are used in the flow analysis to get an exact solution by using the perturbation method. The impact of impotent parameters on stream function and axial velocity has been gained. The set of figures is graphically analyzed of these parameters.
Most of today’s techniques encrypt all of the image data, which consumes a tremendous amount of time and computational payload. This work introduces a selective image encryption technique that encrypts predetermined bulks of the original image data in order to reduce the encryption/decryption time and the
computational complexity of processing the huge image data. This technique is applying a compression algorithm based on Discrete Cosine Transform (DCT). Two approaches are implemented based on color space conversion as a preprocessing for the compression phases YCbCr and RGB, where the resultant compressed sequence is selectively encrypted using randomly generated combined secret key.
The results showed a significant reduct
The Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.
In this paper, a discrete- time ratio-dependent prey- predator model is proposed and analyzed. All possible fixed points have been obtained. The local stability conditions for these fixed points have been established. The global stability of the proposed system is investigated numerically. Bifurcation diagrams as a function of growth rate of the prey species are drawn. It is observed that the proposed system has rich dynamics including chaos.
Dual-species biofilms of Pseudomonas aeruginosa and Staphylococcus aureus generate difficult-to-treat illnesses. Nutrition stress in biofilms affects physiology, microbial metabolism, and species interactions, impacting bacteria growth and survival. Furthermore, the function of alginate, which is encoded by the algD gene, in the production of biofilms has been established. The present study aimed at investigating the impact of starvation on algD gene expression in single-species biofilm of P. aeruginosa and dual-species biofilms of P. aeruginosa and S. aureus from hospital sewage. A total of six P. aeruginosa and six S. aureus isolates were obtained from the microbiology laboratory at the Department of Biology, College of Science, Universit
... Show MoreNanocrystal-ZnS-loaded graphene was synthesized by a facile co-precipitation route. The Graphene was affected on the characterization of ZnS which has been investigated. XRD results reveal that ZnS has a cubic system while the hexagonal structure has been observed by loading graphene during preparation ZnS. D.c-conductivity proves that ZnS and ZnS/Gr have semiconductor behavior. The sensing properties of ZnS/Gr against NO2 gas were investigated as a function of operating temperature and time under optimal condition. The sensitivity, response time and recovery time were calculated with different operating temperatures (100, 150, 200)oC.
In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
Tuaimah GS, AQ Al-Awadi, Ahmed ME., Effect of Cutibacterium acnes cell free antigen (CFAg) immunization, levofloxacin and cinnamon oil on Cutibacterium acnes infection in rabbits, Onl J Vet Res., 22 (9):811-822, 2018. C. acnes causes acne vulgaris most commonly in 12-24 year olds. Five albino rabbits were immunized at day 1 and 14 with Cutibacterium acnes cell free antigen (CFAg) and then infected intradermally with 0.1 ml C. acnes suspension (2×108 cfu/ml) at day 30. Two groups of five infected rabbits were then treated at Day 30 with 0.5% levofloxacin or 0.2% cinnamon oil twice daily for 12 days. Five control rabbits were infected intradermally with 0.1 ml 2×108 cfu/ml Cutibacterium acnes n (2×108 cfu/ml). At day 42, skin test (mm), se
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis study presents the determination of the paleostress magnitudes and orientation of Bekhme Structure in Shaqlawa area, northeastern Iraq. Paleostress analysis of slip-fault measurements is performed using Right dihedral, Lisle diagram, and Mohr Circles methods. Depending on Mohr Circles, Bott law, and vertical thickness, the magnitudes of the paleostress at the time of the tectonic activity were determined. Firstly, Georient Software was used to estimate the orientation of the paleostresses (σ1, σ2, and σ3). Secondly, using the rupture –friction law, taking into account the depth of the overburden and the vertical stress (σv),the magnitudes of the paleostresses were calculated (σ1=4500 bars, σ2=1900 bars and σ3=700 bars). &nb
... Show MoreWe develop the previously published results of Arab by using the function under certain conditions and using G-α-general admissible and triangular α-general admissible to prove coincidence fixed point and common fixed point theorems for two weakly compatible self –mappings in complete b-metric spaces.
Stemming is a pre-processing step in Text mining applications as well as it is very important in most of the Information Retrieval systems. The goal of stemming is to reduce different grammatical forms of a word and sometimes derivationally related forms of a word to a common base (root or stem) form like reducing noun, adjective, verb, adverb etc. to its base form. The stem needs not to be identical to the morphological root of the word; it is usually sufficient that related words map to the same stem, even if this stem is not in itself a valid root. As in other languages; there is a need for an effective stemming algorithm for the indexing and retrieval of Arabic documents while the Arabic stemming algorithms are not widely available.
... Show MoreEstablishing coverage of the target sensing field and extending the network’s lifetime, together known as Coverage-lifetime is the key issue in wireless sensor networks (WSNs). Recent studies realize the important role of nature-inspired algorithms in handling coverage-lifetime problem with different optimization aspects. One of the main formulations is to define coverage-lifetime problem as a disjoint set covers problem. In this paper, we propose an evolutionary algorithm for solving coverage-lifetime problem as a disjoint set covers function. The main interest in this paper is to reflect both models of sensing: Boolean and probabilistic. Moreover, a heuristic operator is proposed as a local refinement operator to improve the quality
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreThis research aims to distinguish the reef environment from the non-reef environment. The Oligocene-Miocene-succussion in western Iraq was selected as a case study, represented by the reefal limestone facies of the Anah Formation (Late Oligocene) deposited in reef-back reef environments, dolomitic limestone of the Euphrates Formation (Early Miocene) deposited in open sea environments, and gypsiferous marly limestone of the Fatha Formation (Middle Miocene) deposited in a lagoonal environment. The content of the rare earth elements (REEs) (La, Ce, Pr, Nd, Sm, Eu, Gd, Tb, Dy, Er, Ho, Tm, Yb, Lu, and Y) in reef facies appear to be much lower than of those in the non-reef facies. The open sea facies have a low content of REEs due to bein
... Show MoreThis article proposes a new strategy based on a hybrid method that combines the gravitational search algorithm (GSA) with the bat algorithm (BAT) to solve a single-objective optimization problem. It first runs GSA, followed by BAT as the second step. The proposed approach relies on a parameter between 0 and 1 to address the problem of falling into local research because the lack of a local search mechanism increases intensity search, whereas diversity remains high and easily falls into the local optimum. The improvement is equivalent to the speed of the original BAT. Access speed is increased for the best solution. All solutions in the population are updated before the end of the operation of the proposed algorithm. The diversification f
... Show MoreExtraction and Description of Urease Enzyme Produced from Staphylococcus saprophyticus and study of its effect on kidney and bladder of white mice
The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show MoreIn this work, the surface of the telescope’s mirror is cleaned using an atmospheric-pressure radio frequency plasma jet (APRFPJ), which is generated by Argon gas between two coaxial metal electrodes. The RF power supply is set to 2 MHz frequencies with three different power levels: 20, 50, and 80 W. Carbon, that has adhered to the surface, can be effectively removed using the plasma cleaning technique, which also modifies any residual bonds. The cleaned surface was clearly distinguished using an optical emission spectroscopy (OES) technique and a water contact angle (WCA) analyzer for the activation property on their surfaces. The sample showed a super hydrophilic surface at an angle of 1° after 2.5 minutes of plasma tre
... Show MoreQuantum dots of CdSe, CdS and ZnS QDs were prepared by chemical reaction and used to fabricate organic quantum dot hybrid junction device. QD-LEDs were fabricated using layers of ITO/TPD: PMMA/CdSe/Alq3, ITO/TPD: PMMA/CdS/Alq3 and ITO/TPD: PMMA/ZnS/Alq3 devices which prepared by phase segregation method. The hybrid white light emitting devices consists, of three-layers deposited successively on the ITO glass substrate; the first layer was of N, N’-bis (3-methylphenyl)-N, N’-bis (phenyl) benzidine (TPD) polymer mixed with polymethyl methacrylate (PMMA) polymers. The second layer was QDs while the third layer was tris (8-hydroxyquinoline) aluminium (Alq3
... Show More