Background: Opportunistic viral infections make an important threat to renal transplantation recipients (RTRs), and with the use of more intense newly-developed immunosuppressive drugs; the risk of renal allograft loss due to reactivation of these viruses has increased considerably. At the top priority of these viruses lie BK polyomavirus (BKV) and human cytomegalovirus (CMV). Reactivation of these viruses in these chronically immunosuppressed RTRs can lead to renal impairment and subsequently allograft loss, unless early detected and properly treated. Objectives: The study aimed to detect and quantify plasma viral load of BKV and CMV in RTRs using quantitative real time PCR (qRT-PCR), in order to study the prevalence of these two viruses in the sole renal transplantation center in Baghdad, and correlate viral load with the diseases severity. Furthermore, the prevalence of BKV-CMV coexistence in RTRs, to find out whether infection by one of them is a risk factor for infection by the other was investigated. Patients and Methods:A total of 99 RTR were enrolled in the study, and 15 non-transplanted patients with chronic kidney diseases (CKD) together with 15 health living donors (LD) were taken as controls. Plasma samples were taken from all participants. From which viral DNA was extracted, and then real time PCR technique was used to measure the viral load. Results:Out of 99, 12 (12.12%) of RTR patients were positive for BK viremia with a viral load (VL) ranging from (1x102 to 1x109 copies/ml), while none of the control groups was BK positive, and 5 patients out of these 12 had BKV nephropathy. For CMV, 13.13% of RTR patients had positive CMV viremia with a VL ranging from (1.25x102 to 7.94x107 copies/ml), and only one of the CKD controls was CMV positive. Only 3 patients had BK-CMV coexistence, which was statistically not a significant risk factor for one another. Conclusion: Our study suggests that both BK polyomavirus and CMV should be considered important causes for nephropathy and allograft loss in RTRs in Iraq.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe
... Show MoreA new series of ?-D-glucose as Schiff bases derivatives is synthesized and characterized with studying their bioactivity. Hydroxyl groups at C (1,2&5,6) sugar moiety are converted into acetal form through a reaction with dry acetone using phosphoric acid and anhydrous zinc chloride as catalysts producing 1,2:5,6-di-O-isopropyledine ?-D-glucofuranose(I). The five memberd ring acetal of C(5,6) is hydrolyzed with acetic acid (65%)and a reaction of the new product with sodium periodate is carried on to get an aldehyde moiety which is used to produce a new series of Schiff bases through reacting with different amino compounds such as 4-amino antipyrene . The suggested chemical structures of the prepared compounds are confirmed by using UV., FT
... Show MoreBackground: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc
... Show MoreThe ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreOpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MoreABSTRACT Background: This study aimed to study the effect of some acidic drinks (Vinegars and fresh Orange juice) and energy drinks (Red bull) on surface roughness of three types of bulkfill composite materials: Filtek posterior bulkfill (3M), Sonicfill (Kerr) and Filtek p60 (3M). Materials and Methods: Total number of 120 samples are prepared by using a mold of (12mm diameter and 3mm height), which were divided into three groups forty samples for each group: Group A: Filtek bulkfill posterior composite (3M), Group B: Sonicfill composite (Kerr), Group C: Filtek P60 (3 M) which then divided into four sub- groups (n=10) (1) samples were kept in distilled water as a control group (2) samples were immersed in Redbull (3) samples were immersed
... Show More