Preferred Language
Articles
/
oBdK7pIBVTCNdQwCpMM9
BK polyomavirus and Cytomegalovirus Co-infections in renal transplant recipients: a single center study
...Show More Authors

Background: Opportunistic viral infections make an important threat to renal transplantation recipients (RTRs), and with the use of more intense newly-developed immunosuppressive drugs; the risk of renal allograft loss due to reactivation of these viruses has increased considerably. At the top priority of these viruses lie BK polyomavirus (BKV) and human cytomegalovirus (CMV). Reactivation of these viruses in these chronically immunosuppressed RTRs can lead to renal impairment and subsequently allograft loss, unless early detected and properly treated. Objectives: The study aimed to detect and quantify plasma viral load of BKV and CMV in RTRs using quantitative real time PCR (qRT-PCR), in order to study the prevalence of these two viruses in the sole renal transplantation center in Baghdad, and correlate viral load with the diseases severity. Furthermore, the prevalence of BKV-CMV coexistence in RTRs, to find out whether infection by one of them is a risk factor for infection by the other was investigated. Patients and Methods:A total of 99 RTR were enrolled in the study, and 15 non-transplanted patients with chronic kidney diseases (CKD) together with 15 health living donors (LD) were taken as controls. Plasma samples were taken from all participants. From which viral DNA was extracted, and then real time PCR technique was used to measure the viral load. Results:Out of 99, 12 (12.12%) of RTR patients were positive for BK viremia with a viral load (VL) ranging from (1x102 to 1x109 copies/ml), while none of the control groups was BK positive, and 5 patients out of these 12 had BKV nephropathy. For CMV, 13.13% of RTR patients had positive CMV viremia with a VL ranging from (1.25x102 to 7.94x107 copies/ml), and only one of the CKD controls was CMV positive. Only 3 patients had BK-CMV coexistence, which was statistically not a significant risk factor for one another. Conclusion: Our study suggests that both BK polyomavirus and CMV should be considered important causes for nephropathy and allograft loss in RTRs in Iraq.

View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Brazilian Dental Science
Association of matrix metalloproteinase-1-1607 1G/2G single nucleotide polymorphism genotypes with periodontitis in Iraqi population
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Journal Of Global Pharma Technology
Contribution of Equilibrium Variables with the High Spike Accuracy of the Position Diagonal Center (4) in the National Volleyball Team Players
...Show More Authors

Publication Date
Mon Feb 15 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Health Educational Program on Nurses' Practices toward Chemotherapy-Induced Peripheral Neuropathy for Children at Hematology Center in Baghdad City
...Show More Authors

Objectives: the study aims to assess nurses' practices toward chemotherapy-induced peripheral neuropathy (CIPN) for children at the hematology center, and to determine the effectiveness of the health education program on nurses' practices toward CIPN, and to find out the relationships between the effectiveness of Health education program and demographic characteristics of nurses.

Methodology: Use quasi-experimental design in the study (a design that divides the sample into two groups, a study group and a control group, with data collection in three stages). This study was conducted at a hematology center in Baghdad city for the period (from December 16th, 2019 to 8th May 202

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2023
Journal Name
Drug And Chemical Toxicology
Single and repeat-dose toxicity and local tolerance assessment of newly developed oil emulsion adjuvant formulations for veterinary purposes
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
He saw a linguistic study, in the Noble Qur’an
...Show More Authors

 

In the name of God, praise be to God, and prayers and peace be upon the best of God’s creation, Muhammad bin Abdullah, and upon his family and companions, and from his family:
And after:
     He saw from verbs that transcend one effect if it is visual and to two effects if it is heart and this action has several strokes and it is an awareness of the sense and illusion and imagination and reason and in addition to that it has many meanings dealt with in the glossary books and as for what the verb included in the audio studies it is the explanation and deletion and slurring The heart of my place. As for what the grammatical studies included, it focuses on one or two effects according to its l

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Bulletin Of The Australian Mathematical Society
A DYNAMICAL STUDY OF SALINE PLUMES IN DESALINATION OUTFALLS
...Show More Authors

View Publication
Crossref
Publication Date
Thu Sep 10 2020
Journal Name
Journal Of Advances In Mathematics
A Study of The Density Property in Module Theory
...Show More Authors

In this paper, there are two main objectives. The first objective is to study the relationship between the density property and some modules in detail, for instance; semisimple and divisible modules. The Addition complement has a good relationship with the density property of the modules as this importance is highlighted by any submodule N of M has an addition complement with Rad(M)=0. The second objective is to clarify the relationship between the density property and the essential submodules with some examples. As an example of this relationship, we studied the torsion-free module and its relationship with the essential submodules in module M.

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Dec 31 2015
Journal Name
مجلة كلية العلوم الاسلامية
The Secret of Marriage in Christianity A Descriptive Study
...Show More Authors

Marriage is a holly secret in Christian religion .So it id natural that its ceremonies acquired religious form .In general the marriage is contracted by minister of religion in presence of the two parties or by a proxy or presence of parents if it is necessary . And to make the condition of publicity for the marriage ,its procedures must be made before witnesses .Also the minister of religionhave to confirm the agreement of the two parties before beginning the procedures.The marriage ceremonies are made.These procedures are religious traditions that includes praying and make blessings and putting the rings in fingers by thepriest . The marriage is a holly secret performed by the crown pray according to the church religious traditions

Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT
...Show More Authors

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref