Background: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV). For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was followed by the resultant sequence. Results: Both B19V IgM and IgG antibody positivity rates are higher among β-TM patients compared to controls. The B19V IgM (35%) and B19V IgG (21.67%) antibodies positivity in β-TM patients compared to 23.3% and 18.33% positivity in the controls was significantly observed. The prevalence of B19V was (8.3%), and the viral copy number in β-TM patients ranged from ≥104– 106 copies/ml than in controls. The B19V genotype 1 subtype a was the only genotype according to the VP1-VP2 region (288 pb) in this study. Conclusions: The prevalence of B19V in patients may be higher than in controls. B19V screening in high-risk groups, such as blood donors, may considerably reduce the prevalence of B19V.
Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThis manuscript presents several applications for solving special kinds of ordinary and partial differential equations using iteration methods such as Adomian decomposition method (ADM), Variation iterative method (VIM) and Taylor series method. These methods can be applied as well as to solve nonperturbed problems and 3rd order parabolic PDEs with variable coefficient. Moreover, we compare the results using ADM, VIM and Taylor series method. These methods are a commination of the two initial conditions.
In this study, the hydromorphodynamic simulation of a stretch of the Euphrates River was conducted. The stretch of the Euphrates River extended from Haditha dam to the city of Heet in Al-Anbar Governorate and it is estimated to be 124.4 km. Samples were taken from 3 sites along the banks of the river stretch using sampling equipment. The samples were taken to the laboratory for grain size analysis where the median size (D50) and sediment load were determined. The hydromorphodynamic simulation was conducted using the NACY 2DH solver of the iRIC model. The model was calibration using the Manning roughness, sediment load, and median particle size and the validation process showed that the error between th
... Show MoreVolterra – Fredholm integral equations (VFIEs) have a massive interest from researchers recently. The current study suggests a collocation method for the mixed Volterra - Fredholm integral equations (MVFIEs)."A point interpolation collocation method is considered by combining the radial and polynomial basis functions using collocation points". The main purpose of the radial and polynomial basis functions is to overcome the singularity that could associate with the collocation methods. The obtained interpolation function passes through all Scattered Point in a domain and therefore, the Delta function property is the shape of the functions. The exact solution of selective solutions was compared with the results obtained
... Show MoreThis study investigates the surgical and thermal effects on oral soft tissues produced by CO2 laser emitting at 10.6 micrometers with three different fluences 490.79, 1226.99 and 1840.4 J/cm2. These effects are specifically; incision depth, incision width and the tissue damage width and depth. The results showed that increasing the fluence and /or the number of beam passes increase the average depths of ablation. Moreover, increasing the fluence and the number of beam passes increase the adjacent tissue damage in width and depth. Surgeons using CO2 laser should avoid multiple pulses of the laser beam over the same area, to avoid unintentional tissue damage.
The aim of this paper is to present a method for solving high order ordinary differential equations with two point's boundary condition, we propose semi-analytic technique using two-point oscillatory interpolation to construct polynomial solution. The original problem is concerned using two-point oscillatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, many examples are presented to demonstrate the applicability, accuracy and efficiency of the method by comparing with conventional methods.
The matter of handwritten text recognition is as yet a major challenge to mainstream researchers. A few ways deal with this challenge have been endeavored in the most recent years, for the most part concentrating on the English pre-printed or handwritten characters space. Consequently, the need to effort a research concerning to Arabic texts handwritten recognition. The Arabic handwriting presents unique technical difficulties because it is cursive, right to left in writing and the letters convert its shapes and structures when it is putted at initial, middle, isolation or at the end of words. In this study, the Arabic text recognition is developed and designed to recognize image of Arabic text/characters. The proposed model gets a single l
... Show MoreThe tentative list of the biodiversity (plants and vertebrates) of Bahr Al-Najaf depression is found to comprise 104 vertebrate species including 2 fishes, 14 reptiles, 73 resident and migratory birds and 15 mammals. The flora consists of 31 species, mainly of plants well adapted to desert conditions that dominate the area, besides few examples of water plants. The salinity was found, through chemical analysis of the lake water, to be of high value which reduces the diversity of aquatic animal and plant diversity.