Preferred Language
Articles
/
ijs-1778
Detection of Epstein Barr Virus Infection in Reactive Arthritis Patients
...Show More Authors

Reactive arthritis (ReA) is an incendiary joint inflammation that occurs few days to weeks after a gastrointestinal or genitourinary infection. The etiology of the disease is not well-known. Therefore, the present study included 80 females and 25 males, divided into 51 patients with reactive arthritis and 54 healthy individuals as control group.  The study involved the detection of serum levels of anti-rheumatoid factor and anti-cyclic citrullinated peptide antibodies (anti-CCP) as well as those of CRP and C3 in all subjects. In addition, EBV levels were detected by Real Time-PCR technique. The results showed significantly increased levels (P < 0.05) of CRP, C3 and anti-CCP Ab in ReA patients’ group compared to the healthy control group (505.42 ± 402.94 versus 255.62 ± 135.5 U/ml, 61.20 ± 100.64 versus 20.43 ± 47.63 ng/ml and 35.11 ± 30.0 versus 6.82 ± 14.01 pg/ml, respectively), Also, the RF results demonstrated a significantly increased percentage in ReA patients’ group compared to a healthy control group (61.11 versus 37.25 %). While, the molecular study showed a non-significant increase in the percentage of EBV in ReA patients’ group compared to a healthy control group (17.65 versus 12.69 %). The results of this study lead to suggest that the immunological markers used may play a role in the development of ReA disease, while there was a non-significant association between EBV infection and ReA disease development.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Determination of the Level of some Adipokines in Hypo-and Hyperthyroids Patients in Baghdad City
...Show More Authors

Determination of the level of adipokines (obestatin, vaspin, tumor necrosis factor-? and interleukin-6)in hypo-and hyperthyroid patients from Educational Baghdad Hospital in Baghdad City was investigated. Fifty patients with hypothyroidism and Fifty patients with hyperthyroidism were selected. A control group of thirty euthyroid persons was included. Blood was collected by vein puncture and serum was separated and stored at –20C. Adipokines (obestatin, vaspin, tumor necrosis factor-? and interleukin-6) were estimated using ELISA method. The findings show a significant (p<0.05) increase in obestatin level in hypothyroid patients, while there is no significant difference in hyperthyroid patientsas compared with the euthyroid subjects.

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Scripta Medica
Effect of proteolytic enzymes and insulin sensitiser in treatment of joint osteoarthritis in diabetic patients
...Show More Authors

Background/Aim: Knee osteoarthritis is a frequently crippling chronic condition. Numerous pharmacological medications have been successfully utilised to treat knee osteoarthritis. This research aimed to compare the efficiency of metformin and serratiopeptidase in treating and preventing osteoarthritis development via distinct mechanisms. Methods: Between 1 January and 30 May 2019, a randomised-clinical-trial was done at Al-Kindy Hospital on 80 osteoarthritis patients, divided in two groups. Group I was given metformin 850 mg orally, whereas Group II was given serratiopeptidase 20 mg and metformin 850 mg orally. Parameters in these groups were compared with forty healthy normal controls. Results: Following treatment, patients in Grou

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of Uranium Concentration in Urine Samples of Kidneys Failure Patients in Al- Muthanna Governorate
...Show More Authors

   The measurement of uranium concentration in human urine is very important in assessment of occupational and public exposure to uranium. In the present work, the fission track technique was used to decide uranium concentration in blood of Kidneys Failure Patients in Al- Muthanna Governorate. The uranium concentration values in urine samples of Kidneys Failure Patients ranged between 0.92  to 4.87  , while Healthy group results were ranged 0.91  to 1.82 . Results showed that the concentration of uranium in the URINE increases in kidney failure patients

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon May 01 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Sprite Region Allocation Using Fast Static Sprite Area Detection Algorithm
...Show More Authors

Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Arabic Cyberbullying Detection Using Support Vector Machine with Cuckoo Search
...Show More Authors

      Cyberbullying is one of the biggest electronic problems that takes multiple forms of harassment using various social media. Currently, this phenomenon has become very common and is increasing, especially for young people and adolescents. Negative comments have a significant and dangerous impact on society in general and on adolescents in particular. Therefore, one of the most successful prevention methods is to detect and block harmful messages and comments. In this research, negative Arabic comments that refer to cyberbullying will be detected using a support vector machine algorithm. The term frequency-inverse document frequency vectorizer and the count vectorizer methods were used for feature extraction, and the results wer

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Sequential feature selection for heart disease detection using random forest
...Show More Authors

Heart disease identification is one of the most challenging task that requires highly experienced cardiologists. However, in developing nations such as Ethiopia, there are a few cardiologists and heart disease detection is more challenging. As an alternative solution to cardiologist, this study proposed a more effective model for heart disease detection by employing random forest and sequential feature selection (SFS). SFS is an effective approach to improve the performance of random forest model on heart disease detection. SFS removes unrelated features in heart disease dataset that tends to mislead random forest model on heart disease detection. Thus, removing inappropriate and duplicate features from the training set with sequential f

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus