Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study aimed to investigate the prevalence of JAK2V617 mutation associated with serum levels of alkaline phophatase (ALK) and lactate dehydrogenase (LDH) in Ph+ CML Iraqi patients treated with imatinib. A total of 43 Ph+ CML patients (24 males and 18 females, age range 16-80 years) who attend Iraqi National Center of Hematology for Research and Treatment/Baghdad were enrolled in this study. Each patient has been received at least six month therapy with imatinib. A consent form involving age, gender, height, weight, smoking status, residency and first family relative history of leukemia was obtained from each patient. Besides, blood samples were collected, from which the granulocytes were separated and then DNA was extracted using a ready kit. Two assays were used for detection of JAK2V617F mutation; real time polymerase chain reaction (qPCR) using specific primers and probe, and allele specific PCR (AS-PCR) using specific primers. Total white blood corpuscles (WBC) as well as serum levels of ALP and LDH were measured. qPCR assay revealed 5 patients out of 43 (11.62%) were heterozygous for the muatant allele of JAK2V617F mutation (genotype GT). The concentration of this allele ranged from 0.01% to 0.12%. None of blood sample gave positive result for AS-PCR assay. From the all risk factors, only gender had significant association with the incidence of JAK2V617F mutation (p= 0.034, OR= 0.5, 95%CI= 0.364-0.687). Average total WBC count, and serum levels of ALP and LDH were higher in JAK2V617F-positive patients (9042±1512.55, 146.05±8.028 IU/L and 204±10.85 IU/L respectively) than that of JAK2V617F-negative patients (6039±1772.239, 64.45±40.15 IU/L and 178.33±13.693 IU/L respectively) with significant differences. These results indicate that JAK2V617F mutation can occur simultaneously with Ph chromosome in CML patients, and qPCR is a highly sensitive method for the detection of this mutation. Furthermore, serum activity of APL can be used as an indicator for the presence of JAK2V617F mutation in CML patients.
Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreBackground and aim: Pomegranate is a medicinal herb that can promote healing of periodontal tissue through differentiation of mesenchymal cells both in vivo and in vitro. Therefore, this study is to investigate the effect of oral supplementation of Punicagranatum L. peel extract on bone defect in rabbit. Methods: Forty five male rabbits were divided into 3 groups; group 1; baseline group(5 rabbits) left without bone defect. Group 2; study group (20 rabbits) with bone defect model that received daily 1ml of oral supplementation of pomegranate peel extract (PoPx). Group 3; control group (20 rabbits) with bone defect model that received distilled water. Bone defect was done into facial plate of lower right central incisor. Blood biopsies by
... Show MoreObjective: The study aimed to assess Leucine-rich alpha-2-glycoprotein-1 biomarker serum level in hospitalized COVID-19 patients. Methods: The case control study from multi-centers in Baghdad included 45 adult patients (19 females and 26 males) with COVID-19, diagnosed with a positive real-time reverse transcription polymerase chain reaction and excluded negative RT-PCR for COVID-19 and comorbidity conditions. Second group, was 43 control (20 females and 23 males). Results: This study found a decrease Leucine-rich alpha-2-glycoprotein-1 biomarker serum level in these patients and a significant difference in D. dimer, neutrophil count, lymphocyte count, and the neutrophil-lymphocyte ratio between the patients and controls at a P valu
... Show MoreA biconical antenna has been developed for ultra-wideband sensing. A wide impedance bandwidth of around 115% at bandwidth 3.73-14 GHz is achieved which shows that the proposed antenna exhibits a fairly sensitive sensor for microwave medical imaging applications. The sensor and instrumentation is used together with an improved version of delay and sum image reconstruction algorithm on both fatty and glandular breast phantoms. The relatively new imaging set-up provides robust reconstruction of complex permittivity profiles especially in glandular phantoms, producing results that are well matched to the geometries and composition of the tissues. Respectively, the signal-to-clutter and the signal-to-mean ratios of the improved method are consis
... Show MoreObjectives: To assess levels of premenstrual psychological disorders of the students in Bab Al-Mua’dham Complex and to find out the relationship between the levels of premenstrual psychological and physical disorders and some demographic characteristics of the students. Methodology: A descriptive study was accomplished throughout the period from the 1st of October, 2015 to the 8th of July, 2016 to assess the psychological and physical problems. A purposive sample of 313 students distributed among different colleges of Bab Al-Mua’dam complex distributed as following: 82 students are from college of Arts; 79
Objectives: To assess levels of premenstrual psychological disorders of the students in Bab Al-Mua’dham Complex and to find out the relationship between the levels of premenstrual psychological and physical disorders and some demographic characteristics of the students. Methodology: A descriptive study was accomplished throughout the period from the 1st of October, 2015 to the 8th of July, 2016 to assess the psychological and physical problems. A purposive sample of 313 students distributed among different colleges of Bab Al-Mua’dam complex distributed as following: 82 students are from college of Arts; 79 students are from College of Languages; 48 students are from college of Islamic Sciences: and 104 are from College of Nursing. For t
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Aims: The aim of this study was to evaluate the value and accuracy of longitudinal strain in detection of coronary artery disease compared to coronary angiography. Results: The left ventricular longitudinal strain-speckle tracking showed evidence of stenosis of left anterior descending artery, circumflex artery and right coronary artery in (86.1%), (76.4%), and (84.7%) respectively. For the stenosis in left anterior descending artery, the current study showed that the longitudinal strain was a good predictor for presence of significant stenosis with a sensitivity of (93.8%), specificity (75%) and accuracy (91.7%) compared with coronary angiography. For the stenosis in right coronary artery, the left ventricular longitudinal strain had
... Show MoreVisceral leishmaniasis (VL) or kala-azar is one of the worlds most neglected tropical diseases in mortality and fourth in morbidity, rK39 dipstick was used to diagnose the suspected infected patients as cheapest simple technique which can differentiate recent from chronic infection, for disease out-coming, naïve T-lymphocyte cells should be differentiated into pathogen-specific immunity responses, such as T-helper 1(Th-1) or (Th-2). HLA-G is a special protein defined as nonclassical HLA class I molecule can suppress the immune system through prevention of T-cell function by foul all T-cell mechanisms. So, this study aimed to detect and evaluate the level of sHLA-G in the sera of patients infected with VL. The results showed that there was
... Show More