Objective: Detection the presumptive prevalence of silent celiac disease in patients with type 1 diabetes mellitus with determination of which gender more likely to be affected.
Methods: One hundred twenty asymptomatic patients [75 male , 45 female] with type 1 diabetes mellitus with mean age ± SD of 11.25 ± 2.85 year where included in the study . All subjects were serologically screened for the presence of anti-tissue transglutaminase IgA antibodies (anti-tTG antibodies) by Enzyme-Linked Immunosorbent Assay (ELISA) & total IgA was also measured for all using radial immunodiffusion plate . Anti-tissue transglutaminase IgG was selectively done for patients who were expressing negative anti-tissue transglutaminase IgA with low total IgA levels & results were compared to that obtained from healthy 60 persons with mean age ± SD for them was 15.25 ± 3.85 year . Al - Kindy Col Med J 2012 ; Vol .8 No. (2) p: 132
Results : Fourteen out of one hundred twenty (11.66 % ) diabetic patients had expressed positivity to anti-tissue transglutaminase IgA compared to 1/60 ( 1.66 %) of non diabetic patients who had expressed such positivity , P value equals to 0.0221 & it is considered to be statistically significant. Three out of one hundred twenty (2.5 % ) diabetic patients had expressed total IgA deficiency whereas all of non diabetic patients were expressing total IgA within the normal range , P value equals to 0.55 & it is considered to be not statistically significant. All of three diabetic patients with total IgA deficiency were not showing positivity to anti-tissue transglutaminase IgG . Six mals & Eight female of those with type 1 diabetes mellitus had expressed positivity to anti-tissue transglutaminase IgA , P value equals to 0.1426 & it is considered to be not statistically significant .
Conclusion : There is an increased prevalence of IgA antitissue transglutaminase antibodies ( 11.66 % ) in children & adolescent with type 1 diabetes mellitus in comparison with control group.
The robot arm is the most popular robotic form used in industry. Thus, it is crucial to make a system programming which could controlled the movement of each part in the industrial robot to make it works properly. One of the simplest models of the robot arm is EDARM ED-7100 which has a controller to control the movement of the robot arm manually. In this study, the robot controller has been redesigned in order to improve this robot's function. The new controller system used AT89S52 microcontroller which has wire connected to the robot hand. A function has been added with this controller to improve the system of controlling and becomes better than the previous system (only manually). The functions of the new system include three mo
... Show MoreOily carwash wastewater is a high organic and chemical wastewater. This paper targeted to investigate a treatment to decrease the water consumption and contaminants in car-washing stations. Electrocoagulation combined with ultrasonic energy (Sono-Electrocoagulation) was suggested so that the carwash wastewater is treated to be reused. The effect of both the voltage and time of treatment on the removal of COD, turbidity, conductivity, and total dissolved solids (TDS) were studied at constant initial pH 7 and electrode distance 2 cm. The results showed the best results of removal COD, turbidity, TDS, and reduce electrical conductivity is when the voltage was 30 V and a treatment time of 90 minutes.
<
... Show MoreDAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
Among several separation processes, the air flotation distinguish as remarkably high potential separation process related to its high separation efficiency and throughput, energy-efficient, simple process, cost-effective, applicable to a wide range of oily wastewater and no by-products. The current study aimed to investigate the effect of the type and concentration of surfactant on the stability of oil-water emulsion and efficiency of the separation process. For this purpose, three types of surfactant where used (anionic SDS, mixed nonionic Span 85/Tween 80, and cationic CTAB). The results demonstrated that the Span 85/Tween 80 surfactant has the best stability, and it increases with the surfactant concentration augmentation. The removal ef
... Show MoreAbstract: Lymphoproliferative Disorders (LPDs) are a group of neoplasms affecting various cells within lymphoid system. Each type has different treatment a..70619
Objective The incidence of rhythm and conduction abnormalities during acute myocardial infarction may approaches 100%; most are seen during the pre-hospital and coronary care unit phases, leading to deleterious effect on morbidity and mortality, this study conducted to find important persistent dysrhythmia found during CCU admission of acute myocardial infarction patients.Method A retrospective observational study of 553 patients who were admitted to the Coronary Care Unit of Alkindy Teaching Hospital during Year 2011 with diagnosis of acute myocardial infarction, Information and data extracted from case sheets and associated 12 leads daily ECGsResults only 25% of our patients had dysrhythmia on examining the present 12 leads ECGs , the
... Show Moreorder to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs
The present study investigates the notion of untranslatability where the concept of equivalence is reconsidered since the misconceptions, related to the said concept, inevitably lead to the emergence of untranslatability. Identifying equivalence as relative, approximate and necessary identity makes the notion of untranslatability a mere theorization. The objectives of the present study are (1) to investigate the notion of untranslatability in terms of the misconceptions associated with the concept of equivalence (2) to examine the possibility of translatability from Arabic into English focusing on culture-bound euphemistic expressions in the Quran as an area of challenge in translation. Data on the translation of culture-bound euphemistic e
... Show MoreEthanolic extracts of Thyme (Thymbra spicata) were tested for their inhibitory action on Paenibacillus larvae the causative agent of American foul brood with different concentration by using disc assay and mixed with culture media . Results showd that 3000mg / disc and 3000 mg / ml was the effective concentroation for the both methods .Thymol was isolated by using TLC technique . The effective concentration of thymol on growth of bacteria was 1000 mg / disc . Thymol and crude extracts of thyme 3000 mg / ml were tested on infected hives by mixed with sugar solution . The symptoms of AFB disease was full disappearance within 21 , 27 days after treatment with thymol and thyme
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the