To determine the important pathogenic role of celiac disease in triggering several
autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years
have been investigated and compared with 25 healthy individuals. All the studied
groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG
by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial
antibodies IgA and IgG by IFAT. There was a significant elevation in the
concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to
control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin
antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies
IgA and IgG . There were 4 positive results (13.33%) for HLA-DQ8 by using HLADQ8 Real-Time PCR test. These results indicated that patients with celiac disease
play an important role in pathogenesis of Multiple Sclerosis.
Toxoplasma gondii (Nicolle and Manceaux ) infects all warm-blooded animals,
including humans. Early diagnosis and determining the infective stage are critical for
treating immunosuppressed individuals and pregnant women with toxoplasmosis.
This parasite modulates pro- and anti-inflammatory responses to regulate parasite
multiplication and host survival. The aim of this study was to investigate the
probability of using IL-6 as a marker of toxoplasmosis disease activity (acute and
chronic) in different groups of women (miscarriage, pregnant and single) and estimate
the relationship between infection and gestational age and history of abortion in
miscarriage and pregnant women. The most abortion were occurred at the
Fusidic acid (FA) is a well-known pharmaceutical antibiotic used to treat dermal infections. This experiment aimed for developing a standardized HPLC protocol to determine the accurate concentration of fusidic acid in both non-ionic and cationic nano-emulsion based gels. For this purpose, a simple, precise, accurate approach was developed. A column with reversed-phase C18 (250 mm x 4.6 mm ID x 5 m) was utilized for the separation process. The main constituents of the HPLC mobile phase were composed of water: acetonitrile (1: 4); adjusted at pH 3.3. The flow rate was 1.0 mL/minute. The optimized wavelength was selected at 235 nm. This approach achieved strong linearity for alcoholic solutions of FA when loaded at a serial concentrati
... Show MoreIn the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show MoreChange detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac
Enterococci are usually encountered and predominate in oral infections, especially those associated with dental root canal infections of necrotic pulp and periodontitis. This study aimed to detect and identify Enterococcus faecium isolated from infected root canals, using polymerase chain reaction ( PCR). Thirty samples were collected from patients with necrotic pulp, infected root canals, and endodontic treatment failure, attending the Conservative Treatment Department, College of Dentistry, Mosul University, Dental Teaching Hospital. The samples were obtained by inserting sterile paper points into the root canals and transferred in brain heart infusion broth vials to be inoculated in a selective M-Enterococcus Agar Base . T
... Show MoreSo far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreActivity recognition (AR) is a new interesting and challenging research area with many applications (e.g. healthcare, security, and event detection). Basically, activity recognition (e.g. identifying user’s physical activity) is more likely to be considered as a classification problem. In this paper, a combination of 7 classification methods is employed and experimented on accelerometer data collected via smartphones, and compared for best performance. The dataset is collected from 59 individuals who performed 6 different activities (i.e. walk, jog, sit, stand, upstairs, and downstairs). The total number of dataset instances is 5418 with 46 labeled features. The results show that the proposed method of ensemble boost-based classif
... Show MoreSmishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreThe present study aimed to determine the serum sex hormone levels among Benign Prostatic Hyperplasia (BPH) patients before and after 3 months of oral administration of 5-α reductase inhibitor(finasteride). Forty BPH patients and 40 healthy men from Amara city were involved in this study, their ages were between 40-59 year. They were all subjected to direct estimation of hormones by MinVidas method including Testosterone (T), Estradiol (E2), Follicle Stimulating Hormone (FSH), Luteinizing Hormone (LH), Prolactin (PRL), and Dihydrotestosterone (DHT) before and after 3 months of treatment with 5α-reductase inhibitor (finasteride) (the healthy individuals didn’t take finasteride).The results showed that T level was significantly lo
... Show More