Background: Opportunistic viral infections make an important threat to renal transplantation recipients (RTRs), and with the use of more intense newly-developed immunosuppressive drugs; the risk of renal allograft loss due to reactivation of these viruses has increased considerably. At the top priority of these viruses lie BK polyomavirus (BKV) and human cytomegalovirus (CMV). Reactivation of these viruses in these chronically immunosuppressed RTRs can lead to renal impairment and subsequently allograft loss, unless early detected and properly treated. Objectives: The study aimed to detect and quantify plasma viral load of BKV and CMV in RTRs using quantitative real time PCR (qRT-PCR), in order to study the prevalence of these two viruses in the sole renal transplantation center in Baghdad, and correlate viral load with the diseases severity. Furthermore, the prevalence of BKV-CMV coexistence in RTRs, to find out whether infection by one of them is a risk factor for infection by the other was investigated. Patients and Methods:A total of 99 RTR were enrolled in the study, and 15 non-transplanted patients with chronic kidney diseases (CKD) together with 15 health living donors (LD) were taken as controls. Plasma samples were taken from all participants. From which viral DNA was extracted, and then real time PCR technique was used to measure the viral load. Results:Out of 99, 12 (12.12%) of RTR patients were positive for BK viremia with a viral load (VL) ranging from (1x102 to 1x109 copies/ml), while none of the control groups was BK positive, and 5 patients out of these 12 had BKV nephropathy. For CMV, 13.13% of RTR patients had positive CMV viremia with a VL ranging from (1.25x102 to 7.94x107 copies/ml), and only one of the CKD controls was CMV positive. Only 3 patients had BK-CMV coexistence, which was statistically not a significant risk factor for one another. Conclusion: Our study suggests that both BK polyomavirus and CMV should be considered important causes for nephropathy and allograft loss in RTRs in Iraq.
This paper presents a nonlinear finite element modeling and analysis of steel fiber reinforced concrete (SFRC) deep beams with and without openings in web subjected to two- point loading. In this study, the beams were modeled using ANSYS nonlinear finite element
software. The percentage of steel fiber was varied from 0 to 1.0%.The influence of fiber content in the concrete deep beams has been studied by measuring the deflection of the deep beams at mid- span and marking the cracking patterns, compute the failure loads for each deep beam, and also study the shearing and first principal stresses for the deep beams with and without openings and with different steel fiber ratios. The above study indicates that the location of openings an
An extensive program of laboratory testing was conducted on ring footing rested on gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59%. There are limited researches available, and even fewer have been done experimentally to understand how to ring footings behave; almost all the previous works only concern the behavior of ring footing under vertical loads, Moreover, relatively few studies have examined the impact of eccentric load and inclined load on such footing. In this study, a series of tests, including dry and wet tests, were carried out using a steel container (600×600×600) mm, metal ring footing (100 mm outer diameter and 40 mm inner diameter) was placed in the m
... Show MoreDue to severe scouring, many bridges failed worldwide. Therefore, the safety of the existing bridge (after contrition) mainly depends on the continuous monitoring of local scour at the substructure. However, the bridge's safety before construction mainly depends on the consideration of local scour estimation at the bridge substructure. Estimating the local scour at the bridge piers is usually done using the available formulae. Almost all the formulae used in estimating local scour at the bridge piers were derived from laboratory data. It is essential to test the performance of proposed local scour formulae using field data. In this study, the performance of selected bridge scours estimation formulae was validated and sta
... Show MoreWellbore stability is considered as one of the most challenges during drilling wells due to the
reactivity of shale with drilling fluids. During drilling wells in North Rumaila, Tanuma shale is
represented as one of the most abnormal formations. Sloughing, caving, and cementing problems
as a result of the drilling fluid interaction with the formation are considered as the most important
problem during drilling wells. In this study, an attempt to solve this problem was done, by
improving the shale stability by adding additives to the drilling fluid. Water-based mud (WBM)
and polymer mud were used with different additives. Three concentrations 0.5, 1, 5 and 10 wt. %
for five types of additives (CaCl2, NaCl, Na2S
A time series analysis can help to observe the behavior of the system and specify the system faults. In addition, it also helps to explain the various energy flows in the system and further aid in reducing the thermodynamic losses. The intelligent supervisory LabVIEW software can monitor the incoming data from the system by using Arduino microcontroller and calculates the important parameters. Energy, exergy, and anergy analysis present in this paper to investigate the system performance as well as its components. To accomplish this, a 4-ton vertical split air conditioner based on vapor compression refrigeration cycle charged with refrigerant R-22 was modified for experimental analysis. The results showed that during 540
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreAerial manipulation of objects has a number of advantages as it is not limited by the morphology of the terrain. One of the main problems of the aerial payload process is the lack of real-time prediction of the interaction between the gripper of the aerial robot and the payload. This paper introduces a digital twin (DT) approach based on impedance control of the aerial payload transmission process. The impedance control technique is implemented to develop the target impedance based on emerging the mass of the payload and the model of the gripper fingers. Tracking the position of the interactional point between the fingers of gripper and payload, inside the impedance control, is achieved using model predictive control (MPD) approach.
... Show MoreDental clinicians and professionals need an affordable, nontoxic, and effective disinfectant against infectious microorganisms when dealing with the contaminated dental impressions. This study evaluated the efficiency of hypochlorous acid (HOCl) as an antimicrobial disinfectant by spraying technique for the alginate impression materials, compared with sodium hypochlorite, and its effect on dimensional stability and reproduction of details. HOCl with a concentration of 200 ppm for 5 and 10 min was compared with the control group (no treatment) as a negative control and with sodium hypochlorite (% 0.5) as a positive control. Candida albicans, Staphylococcus aureus, and Pseudomonas aeruginosa were selected to assess the antimicrobi
... Show MoreAlzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of
... Show More