Background: Genetic factors play an important role in susceptibility to Guillain Barre' syndrome. Human leukocyte antigen (HLA) as part of immune system has a role in the disease process.Aim of the study: to assess the relationship between HLA-A alleles with Guillain Barre' syndrome (GBS) compared with a healthy control group using PCR-SSOP method.Type of the study: Cross-sectional study.Patients and methods:Patient's group consisted of 30 Iraqi Arab Muslims patients with Guillain Barre' syndrome that consulted the Neurological department in Neurosciences Hospital between January-2013 to January- 2014 were genotyped for HLA-A alleles. A control group consisted of 30 healthy volunteers among the staff of AL-Kindi College of Medicine that did not have any neurological disorders.Results: Present study found a decreased frequency of HLA-A:0101 allele (p=0.001) in GBS patients compared to healthy controls.Conclusions: current results suggest that GBS is negatively associated with HLA-A:0101 allele.
This paper presents two main parts: The first part involves manufacturing the specimens form composite material for mechanical testing (tensile, flexural and fatigue tests), then design a custom foot orthesis (CFO) and manufacturing from composite lamination (3nylglass 2carbon fiber 3nylglass) for patient suffer from flexible flat foot since birth and over-pronation. The second part of this research involves a design a model of custom foot orthesis in (solid work 2018) and then analysis of custom foot orthosis in engineering analysis program (ANSYS V.18.2).The applied pressure in boundary condition adopted from Force Sensor Resistance (FSR 402 ) in various regions in foot after wearing composite CFO. Used a composite materials in engineerin
... Show MoreWhen an electron moves from one atom or molecule to another, a charge-transfer complex is formed. The other objects must be able to accept these electrons, and one entity must have free electrons or a tendency to donate them. This resembles an internal oxidation-reduction reaction more. This research aims to shed light on charge transfer complexes formed by polyenes and carotenes, which act as electron-donating molecules due to their alternating double and single bonds. This allows them to create such complexes when interacting with organic molecules that lack electrons. These complexes exhibited distinctive optical and physicochemical properties, enabling them to be adapted for a wide range of applications. In addition, th
... Show MoreA total of four types of instant dry yeast
This paper presents the results of investigating the vibrational characteristics of oblate dish with and without framed structure . A finite element method, was applied to the dynamic analysis of oblate spheroidal shell. Different types of elements were considered in one dimension and two dimensions. It was found that the natural frequencies of oblate shells had two types of behavior against increasing the shell thickness and eccentricity, which are the membrane mode and bending mode –Since – the membrane modes natural frequencies tend to increase with the increasing the eccentricity of oblate, while the bending modes natural frequencies decrease with the increasing the eccentricity till reach the optimum eccentricity.
... Show More
A comprehensive review focuses on 3D network-on-chip (NoC) simulators and plugins while paying attention to the 2D simulators as the baseline is presented. Discussions include the programming languages, installation configuration, platforms and operating systems for the respective simulators. In addition, the simulator’s properties and plugins for design metrics evaluations are addressed. This review is intended for the early career researchers starting in 3D NoC, offering selection guidelines on the right tools for the targeted NoC architecture, design, and requirements.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe aim of the present study is to formulate, evaluate and characterize the nanoemulsion of Domperidone a poorly water-soluble anti-emetic drug.
Domperidone powder is white or almost white powder, photosensitive, practically insoluble in water, slightly soluble in ethanol and in methanol; soluble in dimethylformamide. It is used as an antiemetic for the short-term treatment of nausea and vomiting of various etiologies.
Solubility studies were conducted to select the oil, surfactant and cosurfactant. Phase diagrams were constructed by aqueous phase
... Show MoreChannel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb
... Show MoreThe problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as
... Show More