Background: Uncontrolled hyperphosphatemia is the main difficulty facing staff treating patients with end-stage renal disease on hemodialysis. Sevelamer and calcium-containing phosphate binders have been associated with cost burden and tissue calcification, respectively. Therefore, the current trial was targeted to investigate the efficacy of a new phosphate binder, ferric citrate, in a sample of Iraqi patients with end-stage renal disease on hemodialysis. Keywords: Ferric citrate, Hemodialysis Phosphate binder
Background: Pleural effusion is a common clinical
problem.
Objective: The aim of the study was to evaluate the
diagnostic utility of Carcino embryonic antigen
(CEA), CA 15- 3, and alpha-feto protein ( AFP ) as
a tumor markers in serum and pleural effusion and
evaluate the value of combining them as a diagnostic
tools that are complementary to cytology in the
diagnosis of malignancies .
Methods: Forty patients (18 malignant and 22 benign
pleural effusion) were included in this study .The
serum and effusion levels of CEA, CA 15 – 3 and
AFP were measured using immunoradiometric assay
Results: from the 40 effusions studied 26 were
exudates and 14 were transudates. The level of
pleural effusions
The purpose of this study was to evaluate the anesthetic effectiveness of a buccal infiltration technique combined with local massage (using 2% lidocaine) in the extraction of mandibular premolars to be utilized as an alternative to the conventional inferior alveolar nerve block.
Patients eligible included any subject with a clinical indication for tooth extraction of the mandibular 1st or 2nd premolars. All patients were anesthetized buccally by local infiltration technique followed by an external pressure applied for 1 min directly over the injection area. In each case, another local
This study was conducted to detect C.sakazakii PIF and raw milk. Two hundred samples of PIF were taken from the infected hospital infants who used this type of milk and from the local markets in addition to 16 sample of raw milk were collected. The study is the first to report the isolation of C. sakazakii and Enterobacter spp. from raw milk in Iraq. The distribution of C.sakazakii and Enterobacter spp. among the presumptive isolates using Vitek-GN2 system gave 1/16(6.25%) isolates of C.sakazakii and 4/16 (25%) isolates of Enterobacter spp. Enterobacter spp. isolates include (E.cloacae ssp. cloacae and E.cloacae ssp. dissolvens, E.hormaechei, and E.ludwigii) that isolate from raw milk Differences in between percentages of each isolate perse
... Show MoreBackground: Beta thalassemia major (β-TM) is an inheritable condition with many complications, especially in children. The blood-borne viral infection was proposed as a risk factor due to the recurrent blood transfusion regimen (hemotherapy) as human parvovirus B19 (B19V). Objective: This study investigated the B19V seroprevalence, DNA presence, B19V viral load, and B19V genotypes in β-TM patients and blood donors. Methods: This is a cross-sectional study incorporating 180 subjects, segregated into three distinct groups each of 60 patients, namely control, β-TM, and β-TM infected with Hepatitis C Virus (HCV). For the B19V prevalence in the studied group, the ELISA technique and real-time PCR were used. The genotyping was follo
... Show MoreAbstract
This work is considered the first study for the components of the Iraqi Leucaena leucocephala plant, where the different phytochemical compounds that present in the aerial parts were identified by using the gas chromatography/mass spectrometry technique (GC/MS). The type of the components and their concentration will differ according to the part of the plant used and the method of extraction (hot and cold). This study made a comparison in lupeol concentration that was identified and isolated from petroleum ether fractions of Leucaena leucocephala by using Gas Chromatography/Mass Spectrometry (GC/MS), High-performance thin-layer chromatography (HPTLC), and Preparative High-Performance Li
... Show MoreThe influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic
... Show Moren this study, 25 clinical isolates of Proteus spp. were collected from urine, wounds and burns specimens from different hospitals in Baghdad city, all isolates were identified by using different bacteriological media, biochemical assays and Vitek-2 system. It was found that 15 (60%) isolates were identifies as Proteus mirabilis and 10 (40 %) isolates were Proteus vulgaris. The susceptibility of P. mirabilis and P. vulgaris isolates towards cefotaxime was (66.6 %) and (44.4 %) respectively; while the susceptibility of P. mirabilis and P. vulgaris isolates towards ceftazidime was (20%). Extended spectrum β-lactamses producing Proteus was (30.7 %). DNA of 10 isolates of P. mirabilis and 4 isolates of P. vulgaris were extracted and de
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More