Preferred Language
Articles
/
FRgE7JQBVTCNdQwCnyP9
Detection of active human cytomegalovirus in patients with multiple myeloma
...Show More Authors
Abstract:<sec><title>BACKGROUND:

Human cytomegalovirus (HCMV) infection is ubiquitous and successfully reactivated in patients with immune dysfunction as in patient with multiple myeloma (MM), causing a wide range of life-threatening diseases. Early detection of HCMV and significant advances in MM management has amended patient outcomes and prolonged survival rates.

OBJECTIVES:

The aim of the study was to estimate the frequency of active HCMV in MM patients.

MATERIALS AND METHODS:

This is a case–control study involved 50 MM patients attending Hematology Center, Baghdad Teaching Hospital; 25 of them were newly diagnosed and 25 on treatment compared to 50 of apparently healthy control. HCMV-viral load was measured using a real-time polymerase chain reaction (RT-PCR).

RESULTS:

Active HCMV was detected in 8 patients out of 50 (16%); 6/25 (24%) in newly diagnosed and 2/25 (8%) on treatment and had autologous bone marrow transplant with mean ± standard deviation of 910 × 1010± 210 × 1010, and 32,000 × 1010± 1500 × 1010IU/mL, respectively. HCMV viremia is equally detected in both remission and relapsed cases.

CONCLUSION:

RT-PCR detected a significant number of MM patients infected by cytomegalovirus compared to healthy individuals. Further studies are needed to verify if this finding has a relation to etiology or disease progression.

Clarivate Crossref
View Publication
Publication Date
Thu Apr 01 2021
Journal Name
Computer Methods And Programs In Biomedicine
A hybrid approach based on multiple Eigenvalues selection (MES) for the automated grading of a brain tumor using MRI
...Show More Authors

View Publication
Scopus (37)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Determination the concentration of insulin-like growth factor-I (IGF-I) in saliva of acromegalic patients, and comparison it with the levels of serum IGF-I.
...Show More Authors

Acromegaly is ametabolic disorder characterized by an acquired progressive somatic disfigurement, mainly involving the face, extremities and many other organs, that are associated with systemic manifestations, caused by excessive secretion of growth hormone and a resultant persistent elevation of insulin-like growth factor-I concentrations. In more than 90% of cases originates from a monoclonal benign pituitary adenoma. Aim of this study to assess the level of insulin-like growth factor-I (IGF-I) in saliva of acromegalic patients, and to compare it with the basal levels of serum IGF-I. Sixty specimens of serum and saliva collected from two groups of subjects (forty acromegalic patients and twenty healthy persons). The specimens were

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Complete Blood Count and saliva parameters as an indicator for infected patients with coronavirus covid-19
...Show More Authors

Background: Coronavirus, which causes respiratory illness, has been a public health issue in recent decades. Because the clinical symptoms of infection are not always specific, it is difficult to expose all suspects to qualitative testing in order to confirm or rule out infection as a test. Methods: According to the scientific studies and investigations, seventy-three results of scientific articles and research  were obtained using PubMed, Medline, Research gate and Google Scholar. The research keywords used were COVID-19, coronavirus, blood parameters, and saliva. Results: This review provides a report on the changes in the blood and saliva tests of those who are infected with the COVID-19.COVID-19 is a systemic infection that has

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Evaluation of some Virulence Factors and Drug Resistance of Bacteria Isolated from the Urine of Patients with TCC-Bladder Cancer
...Show More Authors

Urinary tract infections (UTIs) mean microbial pathogens in the urethra or bladder (lower urinary tract). Important risk factors for recurrent UTI include obstruction of the urinary tract, use of a bladder catheter or a suppressed immune system. This study aims to isolate and identify bacteria from patients with TCC-bladder cancer or patients with a negative cystoscope and estimate antibiotic susceptibility patterns and evaluate some of the virulence factors. From a total of 62 patients with TCC-BC or negative cystoscope, only 35 favorable bacterial growths were obtained, including Escherichia coli (UPEC), a significant bacterial isolate, and Stenotrophomonas maltophilia. The percentage of multi drug-resistance bacteria

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
Automatic voice activity detection using fuzzy-neuro classifier
...Show More Authors

Voice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto

... Show More
View Publication Preview PDF
Scopus (7)
Scopus
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
An edge detection algorithm matching visual contour perception
...Show More Authors

For several applications, it is very important to have an edge detection technique matching human visual contour perception and less sensitive to noise. The edge detection algorithm describes in this paper based on the results obtained by Maximum a posteriori (MAP) and Maximum Entropy (ME) deblurring algorithms. The technique makes a trade-off between sharpening and smoothing the noisy image. One of the advantages of the described algorithm is less sensitive to noise than that given by Marr and Geuen techniques that considered to be the best edge detection algorithms in terms of matching human visual contour perception.

View Publication Preview PDF