Background: Acute myocardial infarction
(AMI) is one of the most common diagnoses
in hospitalized patients. The stimulus that
initiates the acute inflammatory process in AMI
has not been identified. Conventional risk
factors account only for approximately half of
the patients with clinically apparent
atherosclerosis which can leads to AMI.
Recently a potential link between infectious
agents and atherosclerosis has been suggested
Objective: To find a possible association
between Helicobacter pylori (H. Pylori)
infection and AMI.
Method: We studied the prevalence of antiH. pylori antibodies in 94 patients who were
admitted with the diagnosis of AMI and a
similar number of healthy individuals who were
age and sex matched. This was done using
ELISA technique.
Results: Overall prevalence of anti-H. pyroli
antibodies in patients with AMI was 82.9%
whereas the prevalence in the control group
was 78.7% . This difference yielded an odd ratio
of 1.317. Chi square test shows that this
difference was insignificant statistically (p-value
0.458)
Conclusion: We feel that our results do not
support the hypothesis which stated that chronic
infection with H. pylori is a major risk factor for
AMI.
Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses
... Show MoreManual probing and periodontal charting are the gold standard for periodontal diagnosis that have been used in practice over a century. These methods are affordable and reliable but they are associated with some drawbacks that cannot be avoided. Among these issues is their reliance on operator’s skills, time-consuming and tedious procedure, lack sensitivity especially in cases of early bone loss, and causing discomfort to the patient. Availability of a wide range of biomarkers in the oral biofluids, dental biofilm, and tissues that potentially reflect the periodontal health and disease accurately encouraged their use as predictive/diagnostic/monitoring tools. Analysing biomarkers during care-giving to the patient using chairside kits i
... Show MorePolypyrrole/silver (PPy/Ag) nanocomposites was synthesized via a chemical oxidative method. The AFM analysis is performed to study the surface roughness, morphology and size distribution of the PPy particles and PPy-ag nanocomposites. The results indicated that as the concentration of Ag in the nanocomposite increases, the roughness also increases. The size of nanoparticles was also evaluated and found in the range of 15 nm to 125 nm. The PPy/Ag nanocomposites exhibited an effectiveness against Gram-negative Escherichia coli showing an inhibition zone of 4mm and displayed poor efficacy against Gram-positive Staphylococcus aureus. Based on given adequate antibacterial characteristics of PPy/Ag nanocomposites, it can be identified as
... Show MoreHBV and HCV are the major causes of chronic liver diseases throughout the world, and constitute a major global health risk. There is accumulated evidence that the imbalance of proinflammatory and anti-inflammatory cytokine production may play an important role in the pathogenesis of viral hepatic infections and may influence the clinical outcome and disease progression. This study was undertaken to analyze the circulating levels of Tumor Necrotic Factor (TNF-α) and Th2 cytokine IL-10 in patients infected with Hepatitis B and C virus. The study population consisted of 30 patients with chronic HBV, in addition to other 30 patients with chronic HCV infection were recruited on their first examination at the Al-Kindy General Hospital in Baghdad
... Show MoreThis study aimed to investigate the ability of clove and cinnamon extracts to make pathogenic multidrug-resistant (MDR) Klebsiella pneumoniae more sensitive to the host’s immune system and thereby interrupt the bacterial infection process in the rat model. Therefore, 60 Wistar male rats were used in this study. The phytochemical constituents of the plant extract were analysed using the gas chromatography-mass spectrometry (GC-MS) technique. Then, the capability of the plant extracts, as prophylactic and treatment, against K. pneumoniae in rats was studied by estimating the complete blood counts (CBCs) and the serum concentrations of interleukin-4 (IL-4) and interferon-gamma (IFN-γ) before and after the treatment. The results showed that
... Show MoreSorting and grading agricultural crops using manual sorting is a cumbersome and arduous process, in addition to the high costs and increased labor, as well as the low quality of sorting and grading compared to automatic sorting. the importance of deep learning, which includes the artificial neural network in prediction, also shows the importance of automated sorting in terms of efficiency, quality, and accuracy of sorting and grading. artificial neural network in predicting values and choosing what is good and suitable for agricultural crops, especially local lemons.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More