Preferred Language
Articles
/
bsj-2743
Detection of RAF fusion transcripts in FFPE samples of Medullablastoma and Ependymom in Iraqi children with RT-RQPCR assays
...Show More Authors

Medulloblastomas and ependymomas are the most common malignant brain tumors in children. However genetic abnormalities associated with their development and prognosis remain unclear. Recently two gene fusions, KIAA1549–BRAF and SRGAP3–RAF1 have been detected in a number of brain tumours. We report here our development and validation of RT-RQPCR assays to detect various isoforms of these two fusion genes in formalin fixed paraffin embedded (FFPE) tissues of medulloblastoma and ependymoma. We examined these fusion genes in 44 paediatric brain tumours, 33 medulloblastomas and 11 ependymomas. We detected both fusion transcripts in 8/33, 5/33 SRGAP3 ex10/RAF1 ex10, and 3/33 KIAA1549 ex16/BRAF ex9, meduloblastomas but none in the 11 ependymomas examined. This investigation provided evidence to the value of RT-RQPCR assays for the detection of these fusion genes in large-scale studies on FFPE tissues. The study also reports the first detection of RAF fusion genes in meduloblstomas.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Assessment of workplace hazards among working children in al amen city, Baghdad
...Show More Authors

Back ground: One out of six children in the
world today is involved in child labor, doing
work that is damaging to his or her mental,
physical and emotional development.
Objective: Assessment of some health
problems among the studied working children.
Method; A cross-sectional study was
conducted in Al Amen Primary Health Care
(PHCC) during the period from January to
August 2009, a sample of 6048 children were
selected randomly(3218girls and2866 boys age
between 5-17 years ) and interviewed to collect
information using a structured questionnaire
form, information related to different aspects
of child labor prevention were included in the
form as well as a general medical examination
and lab

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The role of the woman in protecting children from wrong behavioral deviations
...Show More Authors

Wrong behavioral deviations among youth witnessed an obvious growing, some of these deviations are, robbery, drug and internet addiction, and smoking. Additionally, intellectual extremism and the disrespect of the traditions and genuine customs, In light of this issue, the research aims to shed light on the educational and preventative role of the woman in protecting and immunizing children from the wrong behavioral deviations. The woman has a significant and influential role in the society in general and in her family, in particular to the responsibility lies on her. The research shed light on the manifestations of behavioral deviation in children and the mechanisms of prevention and treatment. The research concluded with a set of recom

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 08 2009
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Evaluation of Dot. ELISA test for Diagnosis Visceral Leishmaniasis in Infected Children
...Show More Authors

Evaluation of Dot. ELISA test for Diagnosis Visceral Leishmaniasis in Infected Children

Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Southwest Jiaotong University
Multi -Focus Image Fusion Based on Stationary Wavelet Transform and PCA on YCBCR Color Space
...Show More Authors

The multi-focus image fusion method can fuse more than one focused image to generate a single image with more accurate description. The purpose of image fusion is to generate one image by combining information from many source images of the same scene. In this paper, a multi-focus image fusion method is proposed with a hybrid pixel level obtained in the spatial and transform domains. The proposed method is implemented on multi-focus source images in YCbCr color space. As the first step two-level stationary wavelet transform was applied on the Y channel of two source images. The fused Y channel is implemented by using many fusion rule techniques. The Cb and Cr channels of the source images are fused using principal component analysis (PCA).

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jul 19 2024
Journal Name
Baghdad Science Journal
The correlation between micro-RNA 146a and IL-17 in the serum of Iraqi patients with cystic echinococcosis
...Show More Authors

داء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن    CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إد

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 02 2024
Journal Name
Iranian Society Of Parasitology
Single Nucleotide Polymorphism of IL-18 (Rs 1946519) in Recurrent Aborted Iraqi Women and Its Association with Toxoplasmosis
...Show More Authors

Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Disc Battery-The escalating risk of ingestion by children in IraqAnd subsequent clinical events and complications.
...Show More Authors

Background: Disc battery ingestion is a common
serious problem in Iraq. It increase in the last years
because of the increase in number of electronic toys
that uses these batteries. These batteries contains
many types of irritant chemicals that increases the
risk of it's ingestion.
Methods:We reviewed the medical records of
children aged between 1year and 7 years
old admitted to Surgical Specialty Hospital/Baghdad
Medical City due to disc battery ingestion from
January 2007 through December 2010). The diagnosis
of disc battery ingestion was based upon history,
clinical symptoms, and results of imaging studies.
The clinical data reviewed included sex, age, clinical
manifestation and duration of sy

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
Detection of Parvovirus B19 DNA in pregnant Sudanese women attending The Military hospital using Nested PCR technique : Detection of Parvovirus B19 DNA in pregnant Sudanese women
...Show More Authors

Background: Parvovirus B19 is a human pathogenic virus associated with a wide range of clinical conditions. During pregnancy congenital infection with parvovirus B19 can be associated with poor outcome, including miscarriage, fetal anemia and non-immune hydrops.  

Objective: The study aimed to determine the prevalenceof Parvovirus B19 DNA in pregnant women attending the Military hospital in Khartoum, demonstrating the association between the virus and poor pregnancy outcomes.

Subjects and methods: This study was a cross sectional study, testing pregnant Sudanese women whole blood samples (n= 97) for the presence of Parvovirus B1

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu May 01 2025
Journal Name
Microbes And Infectious Diseases
Molecular detection and the frequency of a pore-forming toxin in Enterococcus faecalis isolated from urinary tract infections
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref