Background: Helicobacter pylori are important gastrointestinal pathogen associated with gastritis, peptic ulcers, and an increased risk of gastric carcinoma. There are several popular methods for detection of H. pylori (invasive and non-invasive methods) each having its own advantages, disadvantages, and limitations, and by using PCR technique the ability to detect H. pylori in saliva samples offers a potential for an alternative test for detection of this microorganism. Materials and methods: The study sample consists of fifty participants of both genders, who undergo Oesophageo-gastrodudenoscopy at the Gastroenterology Department of Al-Kindy Teaching Hospital Baghdad/ Iraq, during five months period from January 2014 to May 2014. They were grouped into 32 participants with PUD (case group) and 18 healthy participants (control group). A full-mouth examination was performed for every patient; saliva and gastric samples from both groups were obtained. Helicobacter pylori were detected in gastric biopsies by histological examination by using H & E stain, and Polymerase Chain Reaction (PCR) was carried out on the oral samples. Results: Helicobacter pylori DNAwas determined by PCR in oral samples in 88% patients and in gastric biopsies by histology in 86% patients, and in both samples in 84% patients.It was highly significant to find simultaneous presence for those have H. pylori in stomach also have such microorganism in the mouth P < 0.05 and there was an excellent correlation between detecting H. pylori simultaneously in both stomach and mouth. If we screen for stomach H. pylori through detecting this microorganism in the mouth; saliva samples is highly sensitive (98%) but not very specific. Conclusion: Helicobacter pylori saliva test has high sensitivity, specificity, and accuracy for the diagnosis of H. pylori infection in Iraqi population. The test can be clinically applied as a routine diagnostic tool for H. pylori infection this could permit not only a target for therapeutic procedures but also a monitoring tool for the efficacy of therapy. It seems to overcome some limitations of the conventional invasive techniques.
In this paper, the class of semi
The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreReliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect
... Show MoreDiabetic nephropathy (DN) is the foremost cause of end-stage renal disease. Early detection of DN can spare diabetic patients of severe complications. This study aimed to evaluate the diagnostic value of red cell distribution width (RDW) and neutrophil-lymphocyte ratio (NLR) in the detection of DN in patients with type 2 diabetes mellitus (T2DM). This cross-sectional study included a total of 130 patients with T2DM, already diagnosed with T2DM. The albumin creatinine ratio (ACR) in urine samples was calculated for each patient, according to which patients were divided into two groups: with evidence of DN when ACR ? 30 mg/g, and those with no evidence of DN when ACR < 30 mg/g. According to multivariate analysis, each of disease duration (OR
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More