Objective: To determine the correlation between the second derivative of digital pulse wave and the QT variability index. Method: The cross-sectional study was conducted from October 2021 to May 2022 at the Department of Physiology, College of Medicine, University of Mustansiriyah, Baghdad, Iraq, and comprised healthy women. Samples were raised by simple random technique. Digital pulse waves were captured using a fingertip pulse wave transducer. Lab Chart Pro version 7.2 was used to automatically detect and quantify the amplitude of A, B, C, D and E waves expressed by the second derivative. QT interval of each beat was recorded by electrocardiogram, and was calculated automatically via Lab chart Pro version 7.2 without averaging. D
... Show Moreداء المشوكات الكيسي (CE) هو مرض وبائي يسبب مرضًا خطيرًا وخسائر اقتصادية في معظم بلدان العالم. MiRNAs هي عامل جيني ضروري لتنظيم الاستجابة المناعية من خلال قدرته على التدخل في التعبير الخلوي ؛ واحد هذه الحوامض النووية الدقيقة -146 أ. هدفت الدراسة الحالية تقييم إذا كان بإمكاننا استخدام microRNA 146a كمؤشر حيوي للكشف عن CEو تحديد العلاقة بين التعبير الجيني microRNA 146a و IL-17 في مرضى CE.حيث اشتملت الدراسة على 50 مريضًا من CE تم إد
... Show MoreObjectives: To study the spectrum and classification of ATP7B variants in Iraqi children with Wilson disease by direct gene sequencing with clinical correlation. Methods: Fifty-five unrelated children with a clinical diagnosis of Wilson disease (WD) were recruited. Deoxyribonucleic acid was extracted from peripheral blood samples, and variants in the ATP7B gene were identified using next-generation sequencing. Results: Seventy-six deleterious variants were detected in 97 out of 110 alleles of the ATP7B gene. Thirty (54.5%) patients had 2 disease-causing variants (15 homozygous and 15 compound heterozygous). Twelve (21.8%) patients had one disease-causing variant and one variant of uncertain significance (VUS) with potential pathogenicity. T
... Show MoreThe aim of this study is to investigate the kinetics of copper removal from aqueous solutions using an electromembrane extraction (EME) system. To achieve this, a unique electrochemical cell design was adopted comprising two glass chambers, a supported liquid membrane (SLM), a graphite anode, and a stainless-steel cathode. The SLM consisted of a polypropylene flat membrane infused with 1-octanol as a solvent and bis(2-ethylhexyl) phosphate (DEHP) as a carrier. The impact of various factors on the kinetics constant rate was outlined, including the applied voltage, initial pH of the donor phase solution, and initial copper concentration. The results demonstrated a significant influence of the applied voltage on enhancing the rate of c
... Show MoreIn this research, a group of gray texture images of the Brodatz database was studied by building the features database of the images using the gray level co-occurrence matrix (GLCM), where the distance between the pixels was one unit and for four angles (0, 45, 90, 135). The k-means classifier was used to classify the images into a group of classes, starting from two to eight classes, and for all angles used in the co-occurrence matrix. The distribution of the images on the classes was compared by comparing every two methods (projection of one class onto another where the distribution of images was uneven, with one category being the dominant one. The classification results were studied for all cases using the confusion matrix between every
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show MoreThis study was done to evaluate a new technique to determine the presence of methamphetamine in the hair using nano bentonite-based adsorbent as the filler of extraction column. The state of the art of this study was based on the presence of silica in the nano bentonite that was assumed can interact with methamphetamine. The hair used was treated using methanol to extract the presence of methamphetamine, then it was continued by sonicating the hair sample. Qualitative analysis using Marquish reagent was performed to confirm the presence of methamphetamine in the isolate.The hair sample that has been taken in a different period confirmed that this current developing method can be used to analyzed methamphetamine. This m
... Show MoreZinc oxide (ZnO) nanoparticles were synthesized using a modified hydrothermal approach at different reaction temperatures and growth times. Moreover, a thorough morphological, structural and optical investigation was demonstrated using scanning electron microscopy (SEM), x-ray diffraction (XRD), ultra-violate visible light spectroscopy (UV-Vis.), and photoluminescence (PL) techniques. Notably, SEM analysis revealed the occurrence of nanorods-shaped surface morphology with a wide range of length and diameter. Meanwhile, a hexagonal crystal structure of the ZnO nanoparticles was perceived using XRD analysis and crystallite size ranging from 14.7 to 23.8 nm at 7 and 8 ℎ𝑟𝑠., respectively. The prepared ZnO samples showed good abso
... Show More