Objective: Detection the presumptive prevalence of silent celiac disease in patients with type 1 diabetes mellitus with determination of which gender more likely to be affected.
Methods: One hundred twenty asymptomatic patients [75 male , 45 female] with type 1 diabetes mellitus with mean age ± SD of 11.25 ± 2.85 year where included in the study . All subjects were serologically screened for the presence of anti-tissue transglutaminase IgA antibodies (anti-tTG antibodies) by Enzyme-Linked Immunosorbent Assay (ELISA) & total IgA was also measured for all using radial immunodiffusion plate . Anti-tissue transglutaminase IgG was selectively done for patients who were expressing negative anti-tissue transglutaminase IgA with low total IgA levels & results were compared to that obtained from healthy 60 persons with mean age ± SD for them was 15.25 ± 3.85 year . Al - Kindy Col Med J 2012 ; Vol .8 No. (2) p: 132
Results : Fourteen out of one hundred twenty (11.66 % ) diabetic patients had expressed positivity to anti-tissue transglutaminase IgA compared to 1/60 ( 1.66 %) of non diabetic patients who had expressed such positivity , P value equals to 0.0221 & it is considered to be statistically significant. Three out of one hundred twenty (2.5 % ) diabetic patients had expressed total IgA deficiency whereas all of non diabetic patients were expressing total IgA within the normal range , P value equals to 0.55 & it is considered to be not statistically significant. All of three diabetic patients with total IgA deficiency were not showing positivity to anti-tissue transglutaminase IgG . Six mals & Eight female of those with type 1 diabetes mellitus had expressed positivity to anti-tissue transglutaminase IgA , P value equals to 0.1426 & it is considered to be not statistically significant .
Conclusion : There is an increased prevalence of IgA antitissue transglutaminase antibodies ( 11.66 % ) in children & adolescent with type 1 diabetes mellitus in comparison with control group.
Abstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show More