Visceral leishmaniasis (VL) or kala-azar is one of the worlds most neglected tropical diseases in mortality and fourth in morbidity, rK39 dipstick was used to diagnose the suspected infected patients as cheapest simple technique which can differentiate recent from chronic infection, for disease out-coming, naïve T-lymphocyte cells should be differentiated into pathogen-specific immunity responses, such as T-helper 1(Th-1) or (Th-2). HLA-G is a special protein defined as nonclassical HLA class I molecule can suppress the immune system through prevention of T-cell function by foul all T-cell mechanisms. So, this study aimed to detect and evaluate the level of sHLA-G in the sera of patients infected with VL. The results showed that there was a highly significant increase in its level in patient’s sera and this level impressed by different clinical parameters such as age, sex, and symptoms.
Objective The incidence of rhythm and conduction abnormalities during acute myocardial infarction may approaches 100%; most are seen during the pre-hospital and coronary care unit phases, leading to deleterious effect on morbidity and mortality, this study conducted to find important persistent dysrhythmia found during CCU admission of acute myocardial infarction patients.Method A retrospective observational study of 553 patients who were admitted to the Coronary Care Unit of Alkindy Teaching Hospital during Year 2011 with diagnosis of acute myocardial infarction, Information and data extracted from case sheets and associated 12 leads daily ECGsResults only 25% of our patients had dysrhythmia on examining the present 12 leads ECGs , the
... Show MoreAbstract: Lymphoproliferative Disorders (LPDs) are a group of neoplasms affecting various cells within lymphoid system. Each type has different treatment a..70619
In order to investigate the presence of methicillin or multidrug resistant Staphylococcus aureus in food-chain especially Cows raw milk and white raw soft cheese and its whey, a total of 30 samples were collected randomly from different markets in Baghdad Province during December 2012 till February 2013, in which samples were analyzed by a standard isolation protocols of food microbiology with some modification processing by new, modern and rapid technology tools such as chromogenic medium Baird-Parker agar, Electronic RapIDTM Staph Plus Code Compendium Panel System (ERIC®) Dryspot Staphytect Plus and Penicillin Binding Protein (PBP2') Plus assays; as well as, studying the susceptibility of isolates to different selected antibiotics. The r
... Show MoreHuman Herpes Virus-8 (HHV-8) is a sexually transmitted viral infection that can infect the prostate epithelium in immunocompromised adults. Recently, HHV-8 was related to the development and progression of several human malignancies like prostatic adenocarcinoma. This retrospective research was designed to analyze the distribution and possible impact of HHV-8 infection on prostatic adenocarcinogenesis. A total number of one hundred formalin-fixed prostatic tissues were enrolled in this research; forty Prostate Adenocarcinoma (PAC) biopsies, forty biopsies from Benign Prostatic Hyperplasia (BPH), and twenty Apparently Normal Prostatic Tissues (ANPT) as a control group. Detection of HHV -8 DNA was achieved by a highly-sensitive variant of
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreThe importance of efficient vehicle detection (VD) is increased with the expansion of road networks and the number of vehicles in the Intelligent Transportation Systems (ITS). This paper proposes a system for detecting vehicles at different weather conditions such as sunny, rainy, cloudy and foggy days. The first step to the proposed system implementation is to determine whether the video’s weather condition is normal or abnormal. The Random Forest (RF) weather condition classification was performed in the video while the features were extracted for the first two frames by using the Gray Level Co-occurrence Matrix (GLCM). In this system, the background subtraction was applied by the mixture of Gaussian 2 (MOG 2) then applying a number
... Show MoreClustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value
Digital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show More