Background: The acute phase response is a major pathophysiologic phenomena that accompanies inflammation whether acute or chronic. The complements 3 (C3), complement4
(C4) and C-reactive protein (CRP) are positive acute phase proteins (+ve APPs) their production is increased by hepatocyte in osteoarthritis (OA). Chloroquine (CQ) which is a diprotic weak base traditionally used to treat malaria.Todate, the phosphate salt of CQ is used to decrease +ve APPs.
Objective: To evaluate the role of chloroquine phosphate on acute phase proteins C3, C4 and Creactive protein in patients with knee OA.
Subjects and methods :A total of seventy four patients (45 female and 29male) were selected randomly from the outpatients clinic in Baghdad teaching Hospital, Medical City, Baghdad
suffering from knee OA were treated with oral dosage form of CQP for one month, twice daily. The levels of C3, C4 and C-reactive protein in serum of all patients were measured before and after treatment using ELISA technique.The serum level of C3, C4 and C-RP were calculated as mean ± standard error of mean (SEM); paired t-test was used; S= significant, P value < 0.05
Results :The levels of C3, C4 and C-RP were significantly reduced (P< 0.05) in serum of all patients after treatment with CQP for one month.
Conclusion :CQP is a disease modifying anti rheumatic drug (DMARD) used for patients suffering from KOA in order to reduce their C3, C4 and C-RP value and improves the disease
status.
Background: image processing of medical images is major method to increase reliability of cancer diagnosis.
Methods: The proposed system proceeded into two stages: First, enhancement stage which was performed using of median filter to reduce the noise and artifacts that present in a CT image of a human lung with a cancer, Second: implementation of k-means clustering algorithm.
Results: the result image of k-means algorithm compared with the image resulted from implementation of fuzzy c-means (FCM) algorithm.
Conclusion: We found that the time required for k-means algorithm implementation is less than that of FCM algorithm.MATLAB package (version 7.3) was used in writing the programming code of our w
Algorithms for Arabic stemming available in two main types which are root-based approach and stem-based approach. Both types have problems which have been solved in the proposed stemmer which combined rules of both main types and based on Arabic patterns (Tafealat1) to find the added letters. The proposed stemmer achieved root exploration ratio (99.08) and fault ratio (0.9).
The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreCuO-ZnO-Al2O3 catalyst was prepared in the ratios of 20:30:50 respectively, using the coprecipitation method of Cu, Zn and Al carbonates from their nitrate solutions dissolved in distilled water by adding sodium bicarbonate as precipitant.The catalyst was identified by XRD and quantitatively analysis to determine the percentages of its components using flame atomic absorption technique. Also the surface area was measured by BET method. The activity of this prepared catalyst was examined through the oxidation of ethanol to acetaldehyde which was evaluated by gas chromatography.
In this paper, we will generalized some results related to centralizer concept on
prime and semiprime Γ-rings of characteristic different from 2 .These results
relating to some results concerning left centralizer on Γ-rings.
Cybercrime and risks to children between the problems and solutions( An analytical study in the light of international, Arab and national statistics).
Lies the problem of the study to identify a new type of crime is different from the same traditional character of the crimes or what was customary since human creation up to the information revolution and we enter the era of globalization, which is also called (cyber crime) and their negative impact on all segments of society, especially children, as they the day of the most important social security threats, for all local and international communities alike , and those risks require collective action to various sectors and segments of society ,especially the educated classes in order t
The research talks about the interest and its impact on polygamy as a legitimate social psychological issue, where she talked about the concept of polygamy, and evidence of the legitimacy of polygamy, and clarify the conditions, and then touched on the great interests for which the law allowed polygamy, and mentioned some practical models in polygamy, including What is in the interest of men in pluralism, including in the interest of women in pluralism, including in the interests of both sexes in pluralism .
Let S be a prime inverse semiring with center Z(S). The aim of this research is to prove some results on the prime inverse semiring with (α, β) – derivation that acts as a homomorphism or as an anti- homomorphism, where α, β are automorphisms on S.
In this paper, we introduce the concepts of Large-lifting and Large-supplemented modules as a generalization of lifting and supplemented modules. We also give some results and properties of this new kind of modules.
In the last decade, 3D models gained interest in many applications, such as games, the medical field, and manufacture. It is necessary to protect these models from unauthorized copying, distribution, and editing. Digital watermarking is the best way to solve this problem. This paper introduces a robust watermarking method by embedding the watermark in the low-frequency domain, then selecting the coarsest level for embedding the watermark based on the strength factor. The invisibility of the watermark for the proposed algorithm is tested by using different measurements, such as HD and PSNR. The robustness was tested by using different types of attacks; the correlation coefficient was applied for the evaluati
... Show More