Preferred Language
Articles
/
jkmc-143
Vitamin E Level In Friedreich’s Ataxic Phenotype Patients In Four Major Hospitals In Baghdad
...Show More Authors

Background: Friedreich ataxia (FRDA) is the most common form of inherited ataxia, comprising one-half of all hereditary ataxias with a carrier rate between 1 in 60 to 1 in 90 and with a disease prevalence of 1 per 29,000. It can occur in two forms the classic form or in association with a vitamin E dependent ataxia. The precise role of Vitamin E in the nervous system is unknown; An Oxidative attack is suspected to play a role in Ataxia with Vitamin E deficiency, as well as in Friedreich ataxia. Vitamin E is the major free-radical-trapping antioxidant.

Objective: Theobjectives of the study is to asses vitamin E level in patients with Friedreichs ataxia phenotype in Iraqi patients.

Type of the study:Cross-sectional study.

Method: This study was conducted at the neuroscience hospital and Baghdad teaching hospital during the period from the 1st of November 2013 through November 2014. Forty patients with friedreich's ataxia attended in neuroscience hospital and Baghdad teaching hospital during this period; there was12 male, 20 female patients and their age range between (4-50) years.

Results: Regarding the level of vitamin E in patients in the present study, The study revealed that mean level of vitamin E for Friedreich ataxia patients was (10.92 μg/ml) ranging from (8-18 μg/ml),while in the control group the mean was (28.06μg/ml) ranging from (22-36μg/ml), the difference in mean level was found to be statistically significant (p=0.0001.) Thirty percents of (FRDA) patients was (8-9.9μg/ml), while half of patients (50%) were within (10-11.9 μg/ml),and low percentage (15 %)of patients were within (12-13.9 μg/ml ). The rest (5%) were had vitamin E level equal or more than 14 μg/ml. these finding revealed that majority of Friedreich ataxia patients were found with low level of vitamin E (32 patients(80%)), and low percentage with normal level (8 patients(20%.)) Patients with Friedreich ataxia were found to have a comparable level 10.47±1.79(8.4-13.5),11.48±2.61(9.4-18) and 10.66±1.26(9-12.5) for those with less than 10 years, 10-19 years , equal or more than 20 years of age respectively (p=0.382), while it was found to have a significantly decreasing level with advance in the age for the control group, 30.57±4.61(24.5-36), 27.46±3.16(23.7-33.5), 25.50±3.03 (22.9-29) for those less than 10 years, 10-19 years, 20 years or more respectively (p=0.006.) Vitamin E level in relation to Gender showed that Friedriech ataxia male patients had significantly higher vitamin E level compared to females [12.05±2.66 (9.0-18.0) compared to 10.17±1.07 (8.4-12.0)] (p=0.003), while relation to gender in the control group was not of significant value statistically [27.08±2.90 (22.9-30.0) for male compared to 29.04±4.97 (23.7-36) for females] , p=0.136.

Conclusion: In the light of the results of the present study, the following conclusions were made:  The level of vitamin E in friedreichs ataxic phenotype patients was subnormal than normal range representing 80% of the sample selected for the test.  The level of vitamin E in male patients of freidriechs ataxic phenotype patients was higher than female patients.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Isolation and Identification of Vancomycin-Resistant Enterococcus Faecalis
...Show More Authors

One hundred thirty - five clinical specimens of urine, blood, teeth root canal and burns were obtained from patients in hospitals of Baghdad. The specimens were cultured on Pfizer Selective Enterococcus agar to purify Enterococci isolates. 20 E. faecalis isolates were identified biochemically by growing in 10Cº, 45Cº, 6.5% NaCl, at pH 9.6 and confirmed by VITEK. Determination of Vancomycin-Resistant E. faecalis isolates were done by the minimum inhibitory concentrations [MICs] using agar dilution method. Seventeen E. faecalis isolates were determined as Vancomycin-Resistant and Intermediate Resistant.

View Publication Preview PDF
Publication Date
Fri Apr 20 2018
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Optimization of Digital Histopathology Image Quality
...Show More Authors

One of the biomedical image problems is the appearance of the bubbles in the slide that could occur when air passes through the slide during the preparation process. These bubbles may complicate the process of analysing the histopathological images. The objective of this study is to remove the bubble noise from the histopathology images, and then predict the tissues that underlie it using the fuzzy controller in cases of remote pathological diagnosis. Fuzzy logic uses the linguistic definition to recognize the relationship between the input and the activity, rather than using difficult numerical equation. Mainly there are five parts, starting with accepting the image, passing through removing the bubbles, and ending with predict the tissues

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Techniques and Challenges for Generation and Detection Face Morphing Attacks: A Survey
...Show More Authors

      Face recognition system is the most widely used application in the field of security and especially in border control. This system may be exposed to direct or indirect attacks through the use of face morphing attacks (FMAs). Face morphing attacks is the process of producing a passport photo resulting from a mixture of two images, one of which is for an ordinary person and the other is a judicially required. In this case, a face recognition system may allow travel of  persons not permitted to travel through face morphing image in a Machine-Readable Electronic Travel Document (eMRTD) or electronic passport at Automatic Border Control (ABC) gates. In creating an electronic passport, most countries rely on applicant to submit ima

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
Isolation and Identification of Vancomycin-Resistant Enterococcus Faecalis
...Show More Authors

One hundred thirty - five clinical specimens of urine, blood, teeth root canal and burns were obtained from patients in hospitals of Baghdad. The specimens were cultured on Pfizer Selective Enterococcus agar to purify Enterococci isolates. 20 E. faecalis isolates were identified biochemically by growing in 10Cº, 45Cº, 6.5% NaCl, at pH 9.6 and confirmed by VITEK. Determination of Vancomycin-Resistant E. faecalis isolates were done by the minimum inhibitory concentrations [MICs] using agar dilution method. Seventeen E. faecalis isolates were determined as Vancomycin-Resistant and Intermediate Resistant.

View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact Cloud Computing On The Development of Accounting Education: Evidence From Sultanate of Oman
...Show More Authors

Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of ​​cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
Diffusion of Italian language through literary texts: Diffusione dell’italiano attraverso i testi letterari
...Show More Authors

  This work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Strongly and Semi Strongly E_h-b-Vex Functions: Applications to Optimization Problems
...Show More Authors

In this paper, we propose new types of non-convex functions called strongly --vex functions and semi strongly --vex functions. We study some properties of these proposed functions. As an application of these functions in optimization problems, we discuss some optimality properties of the generalized nonlinear optimization problem for which we use, as an objective function, strongly --vex function and semi strongly --vex function.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref