To determine the important pathogenic role of celiac disease in triggering several
autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years
have been investigated and compared with 25 healthy individuals. All the studied
groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG
by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial
antibodies IgA and IgG by IFAT. There was a significant elevation in the
concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to
control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin
antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies
IgA and IgG . There were 4 positive results (13.33%) for HLA-DQ8 by using HLADQ8 Real-Time PCR test. These results indicated that patients with celiac disease
play an important role in pathogenesis of Multiple Sclerosis.
Computer models are used in the study of electrocardiography to provide insight into physiological phenomena that are difficult to measure in the lab or in a clinical environment.
The electrocardiogram is an important tool for the clinician in that it changes characteristically in a number of pathological conditions. Many illnesses can be detected by this measurement. By simulating the electrical activity of the heart one obtains a quantitative relationship between the electrocardiogram and different anomalies.
Because of the inhomogeneous fibrous structure of the heart and the irregular geometries of the body, finite element method is used for studying the electrical properties of the heart.
This work describes t
... Show MoreIn this paper all possible regressions procedure as well as stepwise regression procedure were applied to select the best regression equation that explain the effect of human capital represented by different levels of human cadres on the productivity of the processing industries sector in Iraq by employing the data of a time series consisting of 21 years period. The statistical program SPSS was used to perform the required calculations.
Ethinylestradiol is widely used in oral contraceptive formulations and also for the treatment of various sexual and metabolic disorders. It is not only a genotoxic agent but also a tumor initiating agent. In the present study, the modulatory effect of aqueous extract of date pits was evaluated against the genotoxic effect induced by ethinylestradiol on human lymphocytes using chromosomal aberrations (CA), blast index (BI), mitotic index (MI), sister chromatid exchanges (SCE) and replication index (RI) as parameters. The date pits extract was evaluated at 1.075x10-4, 2.125x10-4, 3.15x10-4 and 4.17x10-4 g/ml along with 10 μM of ethinylestradiol in culture medium. The results showed a significant dose-dependent decrease in the frequency of
... Show MoreThe current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method). Qualitative and quantitative determinations of epicatechin in two tea samples were investigated. Epicatechin identification was made by utilizing preliminary chemical tests and TLC. This identification was also boosted by HPLC and then quantified epicatechin in all ethyl acetate fractions of two tea samples. This research revealed the existence of epica
... Show MoreAbstract:
This research aims to know the reflection of selection of employees strategy dimensions ( selection of employees strategy standards, procedures selection of employees strategy , efficiency based on a selection of employees strategy) on human capital (knowledge, skills, abilities) in a sample of Lecturers consists of (Deans and assistants and heads of departments) in ( Baghdad University) included nine colleges and university president as total sample size (54), which represent almost 50% of the total research community of 116, was used in the light of the objectives of the research descriptive and analytical approach, has been a resolution main tool for data collection as well as the interview p
... Show MoreThe purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin