Preferred Language
Articles
/
kGF-WZkBdMdGkNqjyCY-
Detection of Human Parvovirus (B19) in Beta Thalassemia Major Patients
...Show More Authors
Abstract<sec> <title>Background:

Beta-thalassemia major (β-TM) is inheritable condition with many complications especially in children. The blood-borne viral infection was proposed as a risk factor due to recurrent blood transfusion regimen (hemotherapy).

Objectives:

This study aimed to investigate Human parvovirus B19 (PVB19) prevalence in β-TM patients by serological and molecular means.

Materials and Methods:

This is a cross-sectional study incorporated 180 subjects, segregated into three distinct groups, namely, control (n = 60), β-TM (n = 60), and β-TM infected with hepatitis C Virus (HCV) (n = 60). The enzyme-linked immunosorbent assay for qualification detection of PVB19 was employed, and then real-time detection of PVB19 was done for revealing viral copy number in different groups, alongside other risk factors were explored.

Results:

Both PVB19 IgM and IgG antibodies positivity rates are higher among β-TM patients compared to controls, the PVB19 IgM (35%) and PVB19 IgG (21.67%) positivity in β-TM patients compared to 23.3% and 18.33% positivity in the controls was significantly observed. The mean of PVB19 copy number interestingly higher in control (21.58 ± 1.95) compared to β-TM patients infected with HCV (4.75 ± 1.58). Moreover, serum ferritin showed a significant increase in β-TM patients with HCV (4283.22 ± 351.92) compared to control (28.55 ± 1.06).

Conclusion:

Both PVB19 IgM and IgG Abs positivity rates are higher significantly among β-TM patients compared to controls. Although, the highest mean PVB19 copy number among controls, this finding was not significant. Nevertheless, screening high-risk groups including blood donors for PVB19 may considerably reduce the prevalence of PVB19.

Scopus Crossref
View Publication
Publication Date
Tue Aug 16 2016
Journal Name
Case Studies In Surgery
Ameloblastoma: A clinical study of 25 Iraqi patients
...Show More Authors

Objective: Geographic differences in clinical and pathological aspects of ameloblastoma have been suggested, therefore the purpose of this study was to analyze cases of ameloblastoma in terms of clinical and radiographic manifestations, histopathological types, treatment modalities and recurrence rate and compare them with reports from other parts of the world. Methods: The medical reports of patients diagnosed with ameloblastoma were reviewed and the data concerning the age, gender, chief complaint, the anatomical site of the lesion, radiographic appearance, histopathological diagnosis, treatment approach and recurrence were retrieved. Surgical treatment consisted of either enucleation with curettage and peripheral ostectomy or resection;

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Linguistic Analysis as Mean of Soliciting Patients concerns
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
STATISTICAL ANALYSIS OF PATIENTS INFECTED WITHCORONAVIRUS USING MANOVA
...Show More Authors

Statistics has an important role in studying the characteristics of diverse societies. By using statistical methods, the researcher can make appropriate decisions to reject or accept statistical hypotheses. In this paper, the statistical analysis of the data of variables related to patients infected with the Coronavirus was conducted through the method of multivariate analysis of variance (MANOVA) and the statement of the effect of these variables.

Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Cancer Patients’ Experiences and Understanding of Venous Thromboembolism
...Show More Authors

Background: Venous thromboembolism (VTE), comprising deep vein thrombosis (DVT) and pulmonary embolism (PE), presents an extra challenge in the management of patients with cancer, given the increase in morbidity and mortality in having both conditions. Cancer patients are well known to have a high risk of VTE; particularly; those who have had major surgery, chemotherapy and/or hormonal therapy. These groups of patients need to understand the risk factors and the prophylactic measures to prevent developing VTE. This review aims to provide an overview of the literature on cancer patients’ understanding of VTE and their experiences of cancer-associated thrombosis (CAT).

Method: A scoping review wa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref