Preferred Language
Articles
/
h2FuWZkBdMdGkNqjFia-
Seroprevalence and Molecular Detection of Human Parvovirus B19 in Beta Thalassemia Major Patients
...Show More Authors

Beta thalassemia major (BTM) is a genetic disorder that has been linked to an increased risk of contracting blood-borne viral infections, primarily due to the frequent blood transfusions required to manage the condition. One such virus that can be transmitted through blood is the Human Parvovirus B19 (B19V). The aim of this study was to investigate the frequency and molecular detection of B19V. This study included 60 blood donors as controls and 120 BTM patients. B19V was identified by serology, which measured B19-IgG and B19-IgM antibodies. Nested Polymerase Chain Reaction (nPCR) was employed to target the VP1/VP2 structural proteins. The results showed that B19V seropositivity represents 27.5% (33 out of 120) in BTM patients, and only 8 out of 60 subjects represents (13.3%) in the control group (P-value 0.078). Notably, male patients exhibited a significantly higher prevalence of B19-IgM and B19-IgG antibodies, with 32% and 24% of males testing positive, respectively, compared to female patients. Elevated levels of Aspartate and Alanine Transaminase were observed with values of 51.94±50.09 and 46.81±50.20, respectively. Additionally, nPCR analysis detected B19V DNA in 4.16% (5 out of 120) of BTM patients, while no positive results were detected in the control group. Screening the blood and blood products for the virus in high-risk group can considerably reduce the prevalence. Preventive measures are required in such vulnerable population.

Scopus Crossref
View Publication
Publication Date
Tue Jan 01 2013
Journal Name
Iraqi Journal Of Science
Using of Remote Sensing Technique to Monitor The Status of The Plant and Change Detection for Three Different Periods in Western Region in Baghdad/ Iraq
...Show More Authors

Data of multispectral satellite image (Landsat- 5 and Landsat-7) was used to monitoring the case of study area in the agricultural (extension and plant density), using ArcGIS program by the method of analysis (Soil adjusted vegetative Index). The data covers the selected area at west of Baghdad Government with a part of the Anbar and Karbala Government. Satellite image taken during the years 1990, 2001 and 2007. The scene of Satellite Image is consists of seven of spectral band for each satellite, Landsat-5(TM) thematic mapper for the year 1990, as well as satellite Landsat-7 (ETM+) Enhancement thematic mapper for the year 2001 and 2007. The results showed that in the period from 1990 to 2001 decreased land area exposed (bare) and increased

... Show More
View Publication
Publication Date
Fri Nov 14 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effectiveness of prophylactic agents in prevention of oral mucositis in patients with head and neck cancer receiving radiotherapy
...Show More Authors

Background: Oral mucositis is regarded as one of the major complications of radiation therapy especially in patients with head and neck cancer. The aim of this study was to evaluate the efficacy of glutamine in preventing or minimizing the development of mucositis of the oral cavity. Subjects and methods: Forty-six participants were randomly selected amongst those who were planned to receive radiation therapy for head and neck region cancers. They were randomly divided into two groups of 23 subjects, one group received glutamine and the second group received a placebo. Results: Glutamine had a statistically significant effect in reducing the occurrence and/or severity of oral mucositis in the treated patients compared to patients in the con

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Swine Flu 2009, Morbidity and Mortality in a Sample of patients Admitted in Al-kindy Teaching Hospital
...Show More Authors

Objective; swine flu is known to be caused by influenza A subtypes H1N1,H1N2, H2N3, H3N1, and H3N2, was first proposed to be a disease related to human flu during the 1918 flu pandemic, Iraq face the epidemic of 2009, many patients admitted to the medical word of alkindy teaching hospital, the clinical features were observed and managed according to WHO protocols.
The aim of the study; is to asses some features of morbidity and mortality of swine flu epidemic admitted patients in 2009 in alkindy teaching hospital.
Methods; A total 131 patients with suspected influenza
admitted to Alkindy Teaching Hospital all complain of
fever more than 38c, sore throat with or without cough.
The admitted patients are of two main
groups

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2012
Journal Name
Al-kindy College Medical Journal
Swine Flu 2009, Morbidity and Mortality in a Sample of patients Admitted in Al-kindy Teaching Hospital
...Show More Authors

Objective; swine flu is known to be caused by influenza A subtypes H1N1,H1N2, H2N3, H3N1, and H3N2, was first proposed to be a disease related to human flu during the 1918 flu pandemic, Iraq face the epidemic of 2009, many patients admitted to the medical word of alkindy teaching hospital, the clinical features were observed and managed according to WHO protocols.
The aim of the study; is to asses some features of morbidity and mortality of swine flu epidemic admitted patients in 2009 in alkindy teaching hospital.
Methods; A total 131 patients with suspected influenza
admitted to Alkindy Teaching Hospital all complain of
fever more than 38c, sore throat with or without cough.
The admitted patients are of two main
groups

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 25 2020
Journal Name
Open Access Macedonian Journal Of Medical Sciences
The Efficacy and Prevalence of Montelukast Therapy in Cough-Variant Asthma Patients in Al-Kindy Teaching Hospital
...Show More Authors

BACKGROUND: Cough-variant asthma (CVA) is a type of asthma in which the main symptom is a dry, non-productive cough. OBJECTIVE: The objective of the study was to evaluate the therapeutic effect of Montelukast in CVA and to investigate the prevalence of Montelukast in CVA. METHODS: A cross-sectional study was conducted on 30 patients with chronic cough at least 8 weeks using Montelukast at Al-Kindy Hospital over the period of January 2018‒March 2018. An interview using questionnaire was used to collect the data that were specifically prepared to meet the objective of study including age, sex, associated disease, exacerbation factors, and classical therapy. RESULTS: There was a reduction of the symptoms associated

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Sep 15 2020
Journal Name
Al-academy
Appearance and Decay of Split-brain Theory to Explain Human Artistic Activity: A Historical Review: بدر محمد المعمري
...Show More Authors

Nearly, in the middle of 1970s the split-brain theory became the only theory that explains human creativity used in all fine art and art education schools. In fact, this theory- which appeared for first time in the middle of 1940s – faced many radical changes including its concepts and structures, and these changes affected both teaching art and art criticism. To update people awareness within art field of study, this paper reviews the split-brain theory and its relationship with teaching art from its appearance to its decay in 2013 and after.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref