Objective: Detection the presumptive prevalence of
silent celiac disease in patients with type 1 diabetes
mellitus with determination of which gender more
likely to be affected.
Methods: One hundred twenty asymptomatic patients
[75 male , 45 female] with type 1 diabetes mellitus
with mean age ± SD of 11.25 ± 2.85 year where
included in the study . All subjects were serologically
screened for the presence of anti-tissue transglutaminase
IgA antibodies (anti-tTG antibodies) by Enzyme-
Linked Immunosorbent Assay (ELISA) & total IgA
was also measured for all using radial
immunodiffusion plate . Anti-tissue transglutaminase
IgG was selectively done for patients who were
expressing negative anti-tissue transglutaminase IgA
with low total IgA levels & results were compared
to that obtained from healthy 60 persons with mean
age ± SD for them was 15.25 ± 3.85 year .
Results : Fourteen out of one hundred twenty (11.66
% ) diabetic patients had expressed positivity to antitissue
transglutaminase IgA compared to 1/60 ( 1.66
%) of non diabetic patients who had expressed such
positivity , P value equals to 0.0221 & it is
considered to be statistically significant. Three out of
one hundred twenty (2.5 % ) diabetic patients had
expressed total IgA deficiency whereas all of non
diabetic patients were expressing total IgA within
the normal range , P value equals to 0.55 & it is
considered to be not statistically significant. All of
three diabetic patients with total IgA deficiency were
not showing positivity to anti-tissue transglutaminase
IgG . Six mals & Eight female of those with type 1
diabetes mellitus had expressed positivity to anti-tissue
transglutaminase IgA , P value equals to 0.1426 &
it is considered to be not statistically significant .
Conclusion : There is an increased prevalence of IgA antitissue transglutaminase antibodies ( 11.66 % ) in children & adolescent with type 1 diabetes mellitus in comparison with control group.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreUntil today, one of the leading predominant infections is Urinary tract infection (UTI). It exerts a huge burden on health systems worldwide each year. Treating UTIs empirically with antimicrobials improves morbidity rates. This study aims to assess the prevalence of UTI-associated bacteria in adult patients and to determine their antibiotic susceptibility profile. A retrospective study was conducted for adult outpatients who visited Al-Diwaniya tertiary hospitals from January 2020 till February 2022 to review their medical and lab records in addition to sociodemographic data. A total of 256 patients’ records were included of which 204 (79.7%) belong to females and 52 (20.3%) were males with an average age of 39.22±17.10 years. The pr
... Show MoreUntil today, one of the leading predominant infections is Urinary tract infection (UTI). It exerts a huge burden on health systems worldwide each year. Treating UTIs empirically with antimicrobials improves morbidity rates. This study aims to assess the prevalence of UTI-associated bacteria in adult patients and to determine their antibiotic susceptibility profile. A retrospective study was conducted for adult outpatients who visited Al-Diwaniya tertiary hospitals from January 2020 till February 2022 to review their medical and lab records in addition to sociodemographic data. A total of 256 patients’ records were included of which 204 (79.7%) belong to females and 52 (20.3%) were males with an average age of 39.22±17.10 years. T
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show MoreGlaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma d
The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show More