Objective: To measure the serum levels of Fetuin-A, ischemia-modified albumin (IMA), and ferritin in hospitalized patients with severe COVID-19in Baghdad, Iraq. Moreover, to determine these biomarkers' cut-off valuesthat differentiate between severely ill patients and control subjects. Methods: This case-control study was done from 15 September to the end of December 2021 and involved a review of the files and collectionof blood samples from patients (n=45, group1) hospitalized in COVID-19 treatment centersbecause of severe symptoms compared tohealthy subjects as controls (n=44, group2). Results: Fetuin-A serum levels were not statistically different between patients and controls. In contrast, IMA and ferritin levels were significantly different between the 2 groups, with patients' levelsbeing greater than control participants' (p 0.05). The critical values for the Fetuin-A, IMA, and ferritin tests were 393.78 mg/L, 59.22 ng/ml, and 126 µg/L, respectively, with concentration curves of 0.58, 0.70, and 0.93 for each. Conclusions: Patients and controls showed no significant difference in Fetuin-A levels in the blood. However, IMA and ferritin levels werehigher in people suffering from acute COVID-19 infection than in controls, with Fetuin-A values less than 393.78 mg/L andIMA and ferritin valueshigher than 59.22 ng/mland 126,000 μg/L, respectively.
This paper explores a fuzzy-logic based speed controller of an interior permanent magnet synchronous motor (IPMSM) drive based on vector control. PI controllers were mostly used in a speed control loop based field oriented control of an IPMSM. The fundamentals of fuzzy logic algorithms as related to drive control applications are illustrated. A complete comparison between two tuning algorithms of the classical PI controller and the fuzzy PI controller is explained. A simplified fuzzy logic controller (FLC) for the IPMSM drive has been found to maintain high performance standards with a much simpler and less computation implementation. The Matlab simulink results have been given for different mechanical operating conditions. The simulated
... Show MoreThe research aims at the identity of the accounting information and its characteristics, and then to study the possibility of using accounting information in rationalizing the decisions of capital expenditure. The study relied upon the descriptive analytical approach it is suitable to the nature of this study, the hypotheses of the study were tested by using a number of statistical methods by relying on statistical package program (SPSS), and the research concluded that the companies listed in Khartoum Stock Exchange using accounting information in the comparison between investment alternatives available and estimating the number of years required to recover of the investment cost, the challenges that cause weakness in using the
... Show More: Partial purification of phosphoenolpyruvate carboxykinase (PEPCK) from type 2 diabetic patients sera take place using some purification steps such as participation with ammonium sulphate (55-80%) and filtered through dialysis, then ion exchange chromatography by DEAE sepharose anion column, gel filtration chromatography by sephadex G-100 column. In ion exchange step, there are four peak are obtained, the highest enzyme activity obtained by (0.4 M Nacl) with purification fold (2.18), yield (44.3) of enzyme and specific activity (13.5) mg/ng, which obtained a single peak by gel filtration chromatography, the degree of purification (5.34) fold, yield of enzyme (20%) with specific activity (33.109mg/ng). The purified enzyme had an optimum tem
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show Moreالانهار اصبحت مشبعة بثاني اوكسيد الكربون بشكل عالي وبذلك فهي تلعب دور مهم في كميات الكربون العالمية. لزيادة فهمنا حول مصادر الكربون المتوفرة في النظم البيئية النهرية، تم اجراء هذه الدراسة حول تأثير الكربون العضوي المذاب والحرارة (العوامل الرئيسية لتغير المناخ) كمحركات رئيسية لوفرة ثاني اوكسيد الكربون في الانهار. تم جمع العينات من خمسة واربعون موقع في ثلاثة اجزاء رئيسية لنهر دجلة داخل مدينة بغداد خلال فص
... Show MoreFibromuscular dysplasia (FMD) is a noninflammatory and nonatherosclerotic arteriopathy that is characterized by irregular cellular proliferation and deformed construction of the arterial wall that causes segmentation, constriction, or aneurysm in the intermediate-sized arteries. The incidence of FMD is 0.42–3.4%, and the unilateral occurrence is even rarer. Herein, we report a rare case of a localized extracranial carotid unilateral FMD associated with recurrent transient ischemic attacks (TIAs) treated by extracranial-intracranial bypass for indirect revascularization. The specific localization of the disease rendered our case unique.
The application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show MoreABSTRACT : Alzheimer’s disease (AD) is one of the most common inflammatory neurodegenerative diseases linked with dementia, it is characterized by the deposition of amyloid beta-peptide (Ab) in the brain. The present study aims to innovate a biochemical relationship between AD and interleukin 38 (IL-38) as an anti-inflammatory cytokine, expose novel mechanisms and concepts regarding other biochemical parameters studied previously or recently in AD patients and also examine the biochemical action of memantine (10 mg daily) on AD patients. Sixty (60) diagnosed AD patients participated in the present study and classified into four (4) groups: G3 were composed of (15) newly diagnosed males (52-78) years / without treatment, G4 composed of (15
... Show MoreBackground: Diabetic cheiroarthropathy is a term derived from the Greek word “cheiros” meaning “of the hand”, It is characterized by stiff hands with distinctively thick, tight, and waxy skin, especially on the dorsal aspects of the hands. It is part of long term complication of diabetes and many suggest it is associated with microvascular complication. The aim of the study was to determine the prevalence of diabetic cheiroarthropathy in Iraqi patients with diabetes, and to study its association with diabetic retinopathy and glycemic control. Material and Methods: A cross-sectional study in which 110 diabetic patients and 110 non-diabetic healthy people who accepted to take part in the study were ran
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More