The rapid increase in the number of older people with Alzheimer's disease (AD) and other forms of dementia represents one of the major challenges to the health and social care systems. Early detection of AD makes it possible for patients to access appropriate services and to benefit from new treatments and therapies, as and when they become available. The onset of AD starts many years before the clinical symptoms become clear. A biomarker that can measure the brain changes in this period would be useful for early diagnosis of AD. Potentially, the electroencephalogram (EEG) can play a valuable role in early detection of AD. Damage in the brain due to AD leads to changes in the information processing activity of the brain and the EEG which can be quantified as a biomarker. The objective of the study reported in this paper is to develop robust EEG-based biomarkers for detecting AD in its early stages. We present a new approach to quantify the slowing of the EEG, one of the most consistent features at different stages of dementia, based on changes in the EEG amplitudes (ΔEEG A ). The new approach has sensitivity and specificity values of 100% and 88.88%, respectively, and outperformed the Lempel-Ziv Complexity (LZC) approach in discriminating between AD and normal subjects.
The study was conducted in the Tigris River in Baghdad during May 2021 until March 2022 to follow the impact of climate change, rising temperatures, and the presence of pollutants on the dynamics of phytoplankton and some physicochemical variables from four sites. The results showed that the climatic conditions during different seasons, in addition to the nature of the sampling sites, have a clear and significant impact on the studied traits and, in turn, affect the phytoplankton community. The highest average temperature (30.67 ˚C) was recorded; the pH values ranged between 8.70 & 6.75; the electrical conductivity (1208.18-770.11 µS/cm ) and the total dissolved solids (TDS) (778.95- 439.49 mg/L) were evaluated. Upon measuring
... Show MoreTo determine the relationship between celiac disease and reproductive disorder, twenty two women with recurrent spontaneous abortion (18-35) years have been investigated from the period 2017/11/1 – 2018/2/1 and compared wih twenty two parentally healthy women. All studied groups were carried out to measure antitissue transglutaminase IgA and IgG antibodies by Enzyme linked immunosorbent assay (ELISA) technique, There were a highly significant differences (P < 0.01) in the concentration of anti TtG IgA and IgG Ab compared to control group, while there was non-significant differences (P > 0.05) in the concentration of anti TtG IgA according to the age group and there was a significant difference (P < 0.05) in the concentration of anti TtG I
... Show MoreBackground: Chronic periodontitis is an inflammatory disease of tissues supporting the teeth. Salivary compositions have been most intensely studied as a potential marker for periodontal disease. In this study, analysis of saliva provides a simple and non-invasive method of evaluating the role of salivary IgA (s-IgA) levels in periodontal disease by detecting the level of (s-IgA) in patients with chronic periodontitis smokers and non smokers patients and correlate the mean (s-IgA) levels with clinical periodontal parameters Plaque index (PLI) gingival index (GI), probing pocket depth (PPD) and clinical attachment level (CAL). Materials and Methods: The study samples consists of (15) patients with chronic periodontitis who were non smokers (
... Show MoreThis research is about the resources and the way of al-Waqidi in his
researching of al-sira of the Prophet. And what happened in the first of Islam.
This research is about the documents which al-Waqidi had it. Some of it,
which he had visited, was the places, especially the periods which the events had took
place in. He was asking those whom were contemporary to the happenings, from the
sons of al-Sahaba and al-Tabi’een.
Also this research is lightening on the new studies that gave this historian a
good respect during his work, in which he could gave the reality about his authorship.
The research is trying to draw real way of al-Waqidi and what were reported by him,
especially the documents, and what he had s
Discriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.
In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.
Imagination as a Path to Reality
A cost-effective and efficient detector was created to conduct thorough turbidimetric measurements by reaction of Co (II) ion with calcium ferro cyanide to form bright green particulate, using the method of continuous flow injection analysis, the use of NAG-5SX1-1D-SSP Analyzer in determining cobalt (II) ion in a test for the validity of the new design. The NAG-5SX1-1D-SSP Analyzer is composed of five irradiation sources of white snow leds having the diameter of 10 mm with one solar cell of 55 mm length, 13.5 mm width. Using a selector switch to select the optimum voltage to be used which was 2.7 VDC. Under conditions of optimization, cobalt (II) ion was determined at 0.005–20 mmol. L–1(n = 23) while linearity dynamic range 0.005–7 mm
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More