The diagnosis of acute appendicitis (AA) sometimes is illusive and the accompanying clinical and laboratory manifestations cannot be used for definitive diagnosis. Objective: This study aimed to evaluate the diagnostic value of neutrophil/lymphocyte ratio (NLR) in detection of AA. Materials and Methods: This is a cross-sectional study that included a total of 80 adult patients with AA and 62 age- and gender-matched patients with abdominal pain due to causes other than AA. Three milliliter of peripheral blood were collected from each participant. The NLR was calculated by dividing the absolute neutrophil count by the absolute lymphocyte count. Receiver operating characteristic curve was used to assess the diagnostic value of NLR in detection of AA cases. Results: Mean NLR in AA patients was 7.18 ± 2.11 compared with 2.68 ± 1.08 in patients with abdominal pain due to causes other than AA with a highly significant difference. The area under the curve was 0.916 (95%confidence interval = 0.842–0.989), P < 0.001. The sensitivity and specificity of the test at NLR = 4.45 were 90% and 83%, respectively. Conclusions: NLR is an easy, inexpensive test that can be used for AA detection. This test is more sensitive and more specific than either total white blood cell or absolute neutrophil count
The purpose of this paper is to identifying the level of skill self-esteem of the young tennis players in the Governorate of Baghdad, identifying some aspects of attention (acuteness, concentration, and diversion of attention) among the young tennis players of the Baghdad governorate, and identify the skills of serve and serve spiking in tennis by young tennis players in Baghdad governorate. The researchers used the descriptive approach in the correlative relations style for its suitability and the research problem. the research sample was chosen in a deliberate way from the youth team players in tennis for the Governorate of Baghdad and the participants in the 2021-2022 sports season, whose number is (20) male players and (4) young playe
... Show MoreThe research seeks to identify the impact of fraud detection skills in the settlement of compensatory claims for the fire and accident insurance portfolio and the reflection of these skills in preventing and reducing the payment of undue compensation to some who seek profit and enrichment at the expense of the insurance contract. And compensatory claims in the portfolio of fire and accident insurance in the two research companies, which show the effect and positive return of the detection skills and settlement of the compensation on the amount of actual compensation against the claims inflated by some of the insured, The research sample consisted of (70) respondents from a community size (85) individuals between the director and assistan
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
The study aimed to compare the expression of miR-126-3p and miR-423-5p in patients and normal subjects, and correlate their expression with response to induction therapy. Circulating miR-126-3p and miR-423-5p were measured in the plasma of 43 adult AML patients and 35 age- and sex-matched controls by real time PCR. The foldchange in differential expression for each gene was calculated using the comparative cycle threshold (CT) method (also known as the 2−CT method). For statistical purposes, the fold change was calculated using DDCT (or 2–∆∆Ct) method to find the relative expression of miRNAs. The expression fold change of miR-126-3p was 1.73-fold increase in patients than controls (p= 0.010). The expression fold change of miR-423-5
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
The laboratory experiment was conducted in the laboratories of the Musayyib Bridge Company for Molecular Analyzes in the year 2021-2022 to study the molecular analysis of the inbreed lines and their hybrids F1 to estimate the genetic variation at the level of DNA shown by the selected pure inbreed lines and the resulting hybrids F1 of the flowering gene. Five pure inbreed lines of maize were selected (ZA17WR) Late, ZM74, Late, ZM19, Early ZM49WZ (Zi17WZ, Late, ZM49W3E) and their resulting hybrids, according to the study objective, from fifteen different inbreed lines with flowering time. The five inbreed lines were planted for four seasons (spring and fall 2019) and (spring and fall 2
Diarrhea is a real disease in childhood which could cause death. Therefore, this study was conducted to isolate Salmonella from 350 stool samples taken from children under five years in age, suffering from diarrhea during the period from March 2019 to March 2020 in Tikrit city / Iraq. The results showed the possibility to isolate ten isolates of Salmonella enterica subsp. Enterica, an infection rate, represents 2.875% of the total rate of patients who suffer from diarrhea. The virulence genes were investigated for ten isolates of S. enterica subsp. enterica, the result is that all isolates possessed the genes stn, invA, lpfA with an appearance percentage of 100%, whi
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper