Helicobacter pylori (H. pylori) is widespread and involved in the pathogenesis of the majority of stomach and duodenal diseases. Reduced stomach acidity facilitates the initial infection. Electrolytes (sodium, potassium, and chloride) are essential for the production of stomach acid. This study aimed to observe any changes in the levels of serum electrolytes (Na, K, and Cl) and serum vitamin C levels in a sample of Iraqi patients infected with H. Pylori. We studied 30 infected patients with H. Pylori and 30 matched healthy controls. The results revealed that the serum sodium, potassium, and chloride levels were significantly decreased (p = 0.002, 0.003 and 0.0001, respectively) in the patients infected with the H. Pylori group in comparison with those of the healthy controls. Also, vitamin C levels were significantly lower in patients infected with H. Pylori than in the control group (p = 0.001). The present results suggest that these changes may be attributed to or contribute to the infection itself through changes in gastric acidity, and this needs further study.
This work is aimed to design a system which is able to diagnose two types of tumors in a human brain (benign and malignant), using curvelet transform and probabilistic neural network. Our proposed method follows an approach in which the stages are preprocessing using Gaussian filter, segmentation using fuzzy c-means and feature extraction using curvelet transform. These features are trained and tested the probabilistic neural network. Curvelet transform is to extract the feature of MRI images. The proposed screening technique has successfully detected the brain cancer from MRI images of an almost 100% recognition rate accuracy.
Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreBinary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreBackground: Saliva is a specific bio-fluid with important biomarkers. Analyzing any alternation in these markers could give valuable information, in relation to oral health status parameters. The aim of this study was to investigate the level of α -amylase in unstimulated whole saliva of healthy, primary school children in relation to some oral health parameters. Materials and Methods: A questionnaires consisted of demography and medical histories of participants were filled by children families. Saliva samples were collected for 5- minutes between 9:00 -11:00 AM from 114 healthy students aged 6-13 years, divided into four age groups. Flow- rate, Plaque and Gingival Index were assessed and dentition status was investigated by DMFT/dmft
... Show More