Preferred Language
Articles
/
bijps-1245
Serum Chitotriosidase level as a Novel Biomarker for Therapeutic Monitoring of Nephropathic Cystinosis among the Iraqi children
...Show More Authors

Background: Cystinosis is a rare autosomal recessive lysosomal storage disease with high morbidity and mortality. It is caused by mutations in the CTNS gene that encodes the cystine transporter, cystinosin, which leads to lysosomal cystine accumulation. It is the major cause of inherited Fanconi syndrome, and should be suspected in young children with failure to thrive and signs of renal proximal tubular damage. The diagnosis can be missed in infants, because not all signs of renal Fanconi syndrome are present during the first months of life. Elevated white blood cell cystine content is the cornerstone of the diagnosis. Since chitotriosidase (CHIT1 or chitinase-1) is mainly produced by activated macrophages both in normal and inflammatory conditions which suggest that cystinosis should be included within the differential diagnosis of disorders associated with increased plasma chitotriosidase activity. This study is aimed to estimate serum chitotriosidase level, as a screening marker and therapeutic monitor for cystinosis disease in Iraqi children with cystinosis.
Subjects and Methods: The present study is a case-control study that included samples of 30 children with nephropathic cystinosis, compared to 25 healthy control children from those attending at The Genetic Rare Diseases Center / AL-Emamain AL-Kadhimain Teaching Hospital, Baghdad-Iraq.
Results: Our results reported that cystinotic children had a marked elevation of serum chitotriosidase activity, compared to age-matched healthy children, besides a significant associated with leukocyte-cystine content for cystinotic patients.
CHT1 as a Novel Biomarker
Conclusion: Estimation of serum chitotriosidase activity might aid in monitoring the therapeutic benefits of cysteamine therapy, as well as the prognosis of the disease when WBC cystine assessment is not available.
Key Words: Cystinosis, Cysteamine, Chitotriosidase.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 28 2018
Journal Name
Iraqi Postgraduate Medical Journal
Recurrent Pneumonia in Children at a Tertiary–Pediatric Hospital in Baghdad
...Show More Authors

MK Al-Janabi, NA Nasir, RK Jaber, AO Oleiwe, Iraqi Postgraduate Medical Journal, 2018 - Cited by 7

View Publication
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The Holy Qur’an Approach to Evidence (Signs of branding as a template)
...Show More Authors

The aim of the current research is to study a topic from the Qur’anic topics, few have researched it and realized its content, so people knew it in one name in the Qur’an in another name, and due to the ancientity of the topic and its contemporaneity, I wanted to write about it. The research has an introduction, three demands, and a conclusion with the most important results of the research:
As for the introduction: It was to indicate the importance of the topic and an optional reason for it.
As for the first requirement: it included the definition of reasoning, its divisions, and its characteristics.
As for the second requirement, it was to indicate the meaning, types, and methods of labeling it.
As for the third require

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Stylistic phenomena in the Quranic referral: (Pronouns of backbiting as a model)
...Show More Authors

                       

Research summary

Backbiting pronouns have gained great importance in contemporary textual linguistic studies, as they play a coordinating function in the text and link its parts.

Interpreters did not overlook the role of backbiting pronouns in achieving the function of consistency and coherence in the Qur’anic text, as they referred to this, including Ibn Ashour, who had many analytical practices related to referral issues and their complexities. The Qur'anic reference to the pronouns of backbiting, so the researcher traced these phenomena and their evidence in the Holy Qur'an, aiming to clarify their role in enriching the significance and in the coherence and harmony

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 09 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
OUTSTANDING UNIVERSAL VALUES OF THE SAWA LAKE AS A WORLD NATURAL HERITAGE
...Show More Authors

    This work has been accomplished through a dense field work on the Sawa Lake. The aim of this work is to highlight on characteristics that are consistent with outstanding universal values to be a new Iraqi site belongs to the World Natural Heritage. This study sorted many unique characteristics might ensure that Sawa Lake as a world natural heritage sites. This study shows that the lake had met four natural criteria of the outstanding universal values: (1) the seventh criterion which states to contain superlative natural phenomena or areas of exceptional natural beauty and aesthetic importance. (2) The eighth criterion which stated to be outstanding example representing major stages of earth's history, including the rec

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
A Critical Pragmatic Study of Racism as Conceptualized in the Glorious Quran
...Show More Authors

Racism changes its meaning, shape, purpose or function according to various factors such as time, place, motives, and backgrounds; among others. It seems, however, to have deep roots back in the history of mankind. Such a concept stems from a perceived difference with the other. It is fed by the feeling of being hierarchically superior in opposition to another party that is depicted as inferior. Since ancient times, racism is disguised in different forms and manifests itself on various levels. It is a truism that this ideology can be best presented via language.

Due to its negative implication, racism lends itself to a critical kind of research.  As such, this paper is a critical pragmatic investigation for this phenomenon a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
A Novel Analytical Model to Design Piezoelectric Patches Used to Repair Cracked Beams
...Show More Authors

In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref