Tuberculosis is caused by Mycobacterium tuberculosis; it is considered as one of the most common, infectious diseases and major causes of morbidity and mortality worldwide. A prospective study was conducted to obtain more clarification about the impact of causative agent and its treatment to enhance autoantibodies production such as ANCA and BPI which used as diagnostic markers for several diseases, and to provide further insight into the classical risk factors (age and sex).Seventy patients with tuberculosis involved in this study, 35 of them were untreated and 35 with treatment administration these patients were attending to directorate of general health national reference laboratory in Baghdad during the period between November/ 2012 and March/ 2013 as well as 20 apparently healthy volunteers as control group. Their ages ranged between 11-70 years.The present study revealed that most patients at the third decades of age; male were affected more than female (1.8:1).Estimation of serum ANCA were done by indirect immunofluorescent (IIF) whereas BPI measured by enzyme linked immune sorbent assay (ELISA) and comparing with healthy control (H.C) group.The current study revealed that high significant increasing of ANCA and BPI in tuberculosis patients 71.43% and 15.71% respectively as compared with H.C 15% and 0% respectively. Also the data of the research showed significant differences of ANCA between untreated group 82.85% and treated group 60%. As well as our results showed differences of BPI percentage between, before treatment group 17.14% and after treatment group 14.28% but non-significant (p> 0.05).These results showed that Mycobacterium tuberculosis plays pivotal role in stimulation autoantibodies production. In contrast to our study on the treatment influences had yielded controversial results. Clinically, present of positive ANCA in patients with TB confused the diagnosis of Wegener's granulomatosis as many of the clinical features of this disease eg. Haemoptysis and pulmonary infiltrate may also be found in patients with TB.
The purpose of this paper is to introduce and prove some coupled coincidence fixed point theorems for self mappings satisfying -contractive condition with rational expressions on complete partially ordered metric spaces involving altering distance functions with mixed monotone property of the mapping. Our results improve and unify a multitude of coupled fixed point theorems and generalize some recent results in partially ordered metric space. An example is given to show the validity of our main result.
The contamination of soil with the wastes of oil industry products that are complex mixtures of hydrocarbons increased recently due to the large development of oil industries in Iraq. This study deals with the remediation of low permeability contaminated clayey soil by using the enhanced electrokinetic technique (EK). The contaminated soil samples obtained from Thi-Qar oil refinery plant in Al-Nassyriah city, where the byproducts of refinery plant are disposed into that site. The byproduct contaminant treated as total petroleum hydrocarbons (TPH) to avoid dealing and complexity of treating the individual minerals and compounds consisting the contaminant. The initial concentrations of TPH were (702.7, 1168, 1235) ppm in the contaminated s
... Show MoreThe proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue
... Show MoreThe study evaluates the incidence of inferior alveolar nerve injuries in mandibular fractures, the duration of their recovery, and the factors associated with them. Fifty-two patients with mandibular fractures involving the ramus, angle, and body regions were included in this study; the inferior alveolar nerve was examined for neurological deficit posttraumatically using sharp/blunt differentiation method, and during the follow-up period the progression of neural recovery was assessed. The incidence of neural injury of the inferior alveolar nerve was 42.3%, comminuted and displaced linear fractures were associated with higher incidence of inferior alveolar nerve injury and prolonged recovery time, and recovery of inferior alveolar nerve fun
... Show MoreThe use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreThe impact of a simple trailing-edge plain flap on the aerodynamics of the SD7037 airfoil have been studied in this paper using computational fluid dynamics at Reynolds number of 3×105 across various low angles of attack and flap deflection angles. The computational model was evaluated by using Star CCM+ software with κ--ω SST turbulence and gamma transition model to solve Navier-Stokes equations. The accuracy of the computational model has been confirmed through comparison with experimental data, showing a high level of agreement at low angles of attack. The findings revealed that specific combinations of angles of attack and flap deflection angles could increase the lift-to-drag ratio by over 70% compared to baseline conditions, benefi
... Show MoreThis paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB ) to find the optimal solution
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.