To determine the important pathogenic role of celiac disease in triggering several autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years have been investigated and compared with 25 healthy individuals. All the studied groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial antibodies IgA and IgG by IFAT. There was a significant elevation in the concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies IgA and IgG . There were 4 positive results (13.33%) for HLA-DQ8 by using HLADQ8 Real-Time PCR test. These results indicated that patients with celiac disease play an important role in pathogenesis of Multiple Sclerosis.
Abstract
β-thalassemia major is a genetic disease that causes sever defect in normal hemoglobin synthesis. The patients with β-thalassemia major need periodic blood transfusions that can result in accumulation of body iron, so treatment with iron chelating agent is required. Complications of this iron overload affecting many vital organs, including the liver. The aim of this work was to evaluate liver enzymes in β -thalassemia major patients with deferasirox versus without it. Two groups of β-thalassemia major patients were involved in this study named group A; 40 β-thalassemia patients of blood transfusion dependent without deferasirox, group B; 40 β-thalassemia patients of blood transfusion dependent on de
... Show MoreThe relationship between blood group antigens and peptic ulcer disease has been widely evaluated in the past, but only one study relating H pylori seroprevalence to ABO blood groups among Iraqi patients with peptic ulcer disease is available. We aimed to evaluate the frequency of peptic ulcer disease among different ABO blood groups in Iraqi patients, and we thought it was worthwhile to try to determine whether these components take some part in disease etiology. One hundred and six patients with peptic ulcer disease (PUD) (43 male and 63 female; mean age: 48 ± 18 years) who attended Baghdad teaching hospital and Al- Yarmouk teaching hospital endoscopy centers were enrolled , and 238 control Subjects. Fing
... Show More<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More