Cutaneous leishmaniasis (CL) is an endemic parasitic disease found in many provinces of Iraq. The immune system plays a crucial role in the development or healing of lesions through chemotactic cytokine activity. This study was aimed to detect the levels of two chemokine ligands (CCL2 and CCL5) in Iraqi patients suffering from dermal ulcers, caused by cutaneous leishmaniasis. It was measured in pre and post-treatment state of Pentostam (Pentavalent Antimony 100 mg). Blood serum concentrations of CCL2, CCL5 were measured by enzyme-linked immunosorbent assay among newly infected patients, two-trial treatment patients and three-trial treatment patients, in comparison with the control group. The result indicated a significant difference in CCL5 level for the three groups of CL patients. Whereas the control (p˂0.5), CCL2 level counterparts showed a significant difference only in newly infected and the thee-trial treatment groups. Moreover, there was a significant difference between all CCL5 patient groups, while no observed difference was detected within patient groups of CCL2.Thus altering the chemokine levels before and after treatment gives insights for parasite role in chemokine expression which may help in new therapeutic approaches for dry or wet CL.
Anaemia is a common extra-articular manifestation of rheumatoid arthritis (RA) where anaemia of chronic disease (ACD) and iron deficiency anaemia (IDA) are the two most frequent types. The distinction between these two types of anaemia has always been challenging requiring sophisticated techniques. Serum transferrin receptor (sTfR) a truncated soluble form of the transferrin receptor is one of the parameters that is influenced by the Iron content and supply to the erythrons and is not affected by inflammatory status and therefore the use of the sTfR/log ferritin (sTfR-F) index can be a reliable indicator of functional iron deficiency.
This work studies the role of serum apelin-36 and Glutathione S-transferases (GST) activity in association with the hormonal, metabolic profiles and their link to the risk of cardiovascular disease (CVD) in healthy and patients' ladies with polycystic ovary syndrome (PCOS). A total of fifty-four (PCOS) patients and thirty-one healthy woman as a control have been studied. The PCOS patients were subdivided on the basis of body-mass-index (BMI), into 2-subgroups (the first group was obese-PCOS with BMI ≥ 30 and the second group was non-obese PCOS MBI<30). Fasting-insulin-levels and Lipid-profile, Homeostatic-model assessment-of-insulin-resistance (HOMA-IR), follicle-stimulating-hormone (FSH), luteinizing-hormone (LH), testosterone and
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreThe importance of efficient vehicle detection (VD) is increased with the expansion of road networks and the number of vehicles in the Intelligent Transportation Systems (ITS). This paper proposes a system for detecting vehicles at different weather conditions such as sunny, rainy, cloudy and foggy days. The first step to the proposed system implementation is to determine whether the video’s weather condition is normal or abnormal. The Random Forest (RF) weather condition classification was performed in the video while the features were extracted for the first two frames by using the Gray Level Co-occurrence Matrix (GLCM). In this system, the background subtraction was applied by the mixture of Gaussian 2 (MOG 2) then applying a number
... Show MoreClustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value
Digital images are open to several manipulations and dropped cost of compact cameras and mobile phones due to the robust image editing tools. Image credibility is therefore become doubtful, particularly where photos have power, for instance, news reports and insurance claims in a criminal court. Images forensic methods therefore measure the integrity of image by apply different highly technical methods established in literatures. The present work deals with copy move forgery images of Media Integration and Communication Center Forgery (MICC-F2000) dataset for detecting and revealing the areas that have been tampered portion in the image, the image is sectioned into non overlapping blocks using Simple
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show More