Objective: Detection the presumptive prevalence of
silent celiac disease in patients with type 1 diabetes
mellitus with determination of which gender more
likely to be affected.
Methods: One hundred twenty asymptomatic patients
[75 male , 45 female] with type 1 diabetes mellitus
with mean age ± SD of 11.25 ± 2.85 year where
included in the study . All subjects were serologically
screened for the presence of anti-tissue transglutaminase
IgA antibodies (anti-tTG antibodies) by Enzyme-
Linked Immunosorbent Assay (ELISA) & total IgA
was also measured for all using radial
immunodiffusion plate . Anti-tissue transglutaminase
IgG was selectively done for patients who were
expressing negative anti-tissue transglutaminase IgA
with low total IgA levels & results were compared
to that obtained from healthy 60 persons with mean
age ± SD for them was 15.25 ± 3.85 year .
Results : Fourteen out of one hundred twenty (11.66
% ) diabetic patients had expressed positivity to antitissue
transglutaminase IgA compared to 1/60 ( 1.66
%) of non diabetic patients who had expressed such
positivity , P value equals to 0.0221 & it is
considered to be statistically significant. Three out of
one hundred twenty (2.5 % ) diabetic patients had
expressed total IgA deficiency whereas all of non
diabetic patients were expressing total IgA within
the normal range , P value equals to 0.55 & it is
considered to be not statistically significant. All of
three diabetic patients with total IgA deficiency were
not showing positivity to anti-tissue transglutaminase
IgG . Six mals & Eight female of those with type 1
diabetes mellitus had expressed positivity to anti-tissue
transglutaminase IgA , P value equals to 0.1426 &
it is considered to be not statistically significant .
Conclusion : There is an increased prevalence of IgA antitissue transglutaminase antibodies ( 11.66 % ) in children & adolescent with type 1 diabetes mellitus in comparison with control group.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreSpraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
Geotechnical engineering like any other engineering field has to develop and cope with new technologies. This article intends to investigate the spatial relationships between soil’s liquid limit (LL), plasticity index (PI) and Liquidity index (LI) for particular zones of Sulaymaniyah City. The main objective is to study the ability to produce digital soil maps for the study area and determine regions of high expansive soil. Inverse Distance Weighting (IDW) interpolation tool within the GIS (Geographic Information System) program was used to produce the maps. Data from 592 boreholes for LL and PI and 245 boreholes for LI were used for this study. Layers were allocated into three depth ranges (1 to 2, 2 to 4 and 4 to 6)
... Show MoreThe use of credit cards for online purchases has significantly increased in recent years, but it has also led to an increase in fraudulent activities that cost businesses and consumers billions of dollars annually. Detecting fraudulent transactions is crucial for protecting customers and maintaining the financial system's integrity. However, the number of fraudulent transactions is less than legitimate transactions, which can result in a data imbalance that affects classification performance and bias in the model evaluation results. This paper focuses on processing imbalanced data by proposing a new weighted oversampling method, wADASMO, to generate minor-class data (i.e., fraudulent transactions). The proposed method is based on th
... Show MoreRecently, the phenomenon of the spread of fake news or misinformation in most fields has taken on a wide resonance in societies. Combating this phenomenon and detecting misleading information manually is rather boring, takes a long time, and impractical. It is therefore necessary to rely on the fields of artificial intelligence to solve this problem. As such, this study aims to use deep learning techniques to detect Arabic fake news based on Arabic dataset called the AraNews dataset. This dataset contains news articles covering multiple fields such as politics, economy, culture, sports and others. A Hybrid Deep Neural Network has been proposed to improve accuracy. This network focuses on the properties of both the Text-Convolution Neural
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreThe research attempts to identify the pattern of punctuation in contemporary Iraqi poetry through delving into the poetry of an Iraqi poet belonging to the seventieth generation, Namik Abdul Deeb, who belongs to the poets of Arab modernity in general, the research has reached many results, including that the signs of deletion were vocabulary marks any They are located in the center of the poetic singular, or inline markers, which are those that fall within the poetic line of the prose poem separating its vocabulary, or cross-sectional marks located within the poetic passages that are part of the poetic text, and finally text marks which are located within the poetic text and fragmented into Parts. The research also found that the work of
... Show MoreSeveral studies have indicated that more than 600 cities in the world (intermas of rapid growth and development) will generate about 60% of international economic growth between 2010 and 2025 . by 2025 , 66% of the worlds population will live in urban areas the management of cities will face challenges that accompany this increase in the population which requires preparing to face these challenges and problems and the need to provide the aim of the research to know the readiness of Baghdad city to implement the strategies of urban management throught on asmple representing the ( Advisiry group for the comprechnsive development plan for the city of Baghdad 2030 and its supporters ) in the municipality of Baghdad and the number of
... Show More