Background: Accurate detection of thyroid autoantibodies by enzyme linked immunosorbant assay technique namely thyroglobulin antibody, thyroid peroxides antibody is crucial in the differentiation of autoimmune thyroid disorders from other form of thyroid diseases.
Objective: Evaluation of the detection of thyroglobulin antibody and thyroid peroxides antibody in different thyroid diseases using enzyme linked immunosorbant assay technique.
Methods: - Seventy-five patients admitted to Surgical Units of Baghdad Medical City Hospital for the period between "October 2010 to June 2011" they were waiting to do thyroidectomy. They were chosen nonselectively for serological evaluation of above autoantibodies , and correlation of the results with histopathological diagnosis.
Results:- Clinical results; Colloid goiter is common cause of hyperthyroidism (19 were colloid goiter out of 30 total hyperthyroid patients ) (63%) , and still common thyroid surgery (56 were colloid goiter out of 75 thyroid surgery) (75%).
Histopathological results;- 56 cases (75%) had colloid goiter, 9 patients had Graves' disease (12%), and 3 had lymphocytic thyroiditis (4%), 7 had thyroid neoplasia (both benign and malignant) (9%).
The serological results; Antibodies positive results were 6 patients (10.7%) in colloid goiter ( p-> 0.05), 6 patients (66%) and 1 patient (33%) for GD, and lymphocytic thyroiditis respectively( P-< 0.05)., while its all were negative in thyroid neoplasia.
Conclusion:- Serum thyroid autoantibodies determination is valuable test in clinical practice of autoimmune thyroid diseases.
Anemia of chronic disease (ACD) and iron deficiency anemia (IDA) are the two most important types of anemia in rheumatoid arthritis (RA). Functional iron deficiency in ACD can be attributed to overexpression of the main iron regulatory hormone hepcidin leading to diversion of iron from the circulation into storage sites resulting in iron-restricted erythropoiesis. The aim is to investigate the role of circulating hepcidin and to uncover the frequency of IDA in RA. The study included 51 patients with RA. Complete blood counts, serum iron, total iron binding capacity, ferritin, and hepcidin- 25 were assessed. ACD was found in 37.3% of patients, IDA in 11.8%, and combined (ACD/IDA) in 17.6%. Serum hepcidin was higher in ACD than in con
... Show MoreBipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More