Pregnancy pose an additional burden on the body of the mother so as to meet their needs and the needs of the fetus and the body's need to iron increases excessively during pregnancy and iron is an essential element for the formation of hemoglobin blood Either hemoglobin is the key ingredient for red blood cells which carries oxygen to parts of the body, alas, most of the pregnant women begin their pregnancy inadequate stocks of iron in their bodies, which does not cover their need and requirement of the fetus, especially in the second and third trimesters of pregnancy When you reach the mother to the period in which they did not have the adequate amount of iron to produce hemoglobin become the mother was anemic So emerged the problem of research to figure out the relationship between maternal age and hemoglobin values packed cell volume in the last third of pregnancy and the results showed that the second age group (Class of childbearing age ) showed best values of hemoglobin in the blood and also showed that the average size of the packed cell volume within the normal range , reaching ( 30.6 %) for the first age group as well as the presence of a statistically significant relationship among the values of hemoglobin and the size of tpacked cell volume he with three age groups and show a statistically significant relationship between the age of the mother and the values of hemoglobin in the blood and the high incidence of anemia among sample
Abstract Objective: The underlying molecular basis of ischemic heart diseases (IHDs) has not yet been studied among Iraqi people. This study determined the frequency and types of some cardiovascular genetic risk factors among Iraqi patients with IHDs. Methods: This is a cross-sectional study recruiting 56 patients with acute IHD during a 2-month period excluding patients >50 years and patients with documented hyperlipidemia. Their ages ranged between 18 and 50 years; males were 54 and females were only 2. Peripheral blood samples were aspirated from all patients for troponin I and DNA testing. Molecular analysis to detect 12 common cardiovascular genetic risk factors using CVD StripAssay® (ViennaLab Diagnostics GmbH, Austria) was performed
... Show MoreThis paper presents the non-linear finite element method to study the behavior of four reinforced rectangular concrete MD beams with web circular openings tested under two-point load. The numerical finite elements methods have been used in a much more practical way to achieve approximate solutions for more complex problems. The ABAQUS /CAE is chosen to explore the behavior of MD beams. This paper also studies, the effect of both size and shape of the circular apertures of MD beams. The strengthening technique that used in this paper is externally strengthening using CFRP around the opening in the MD beams. The numerical results were compared to the experimental results in terms of ultimate load failure and displace
... Show MoreCr2O3 thin films have been prepared by spray pyrolysis on a glass substrate. Absorbance and transmittance spectra were recorded in the wavelength range (300-900) nm before and after annealing. The effects of annealing temperature on absorption coefficient, refractive index, extinction coefficient, real and imaginary parts of dielectric constant and optical conductivity were expected. It was found that all these parameters increase as the annealing temperature increased to 550°C.
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreImproving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
Background: Lateral sinus augmentation and simultaneous insertion of dental implants is a highlypredictable procedure and associated with high rate of implants success.Aims: To evaluate implant stability changes following maxillary sinus augmentation utilizing deproteinizedbovine bone alone or mixed with platelet-rich fibrin.Materials and Methods: A total of 34 lateral sinus augmentation procedures were performed and 50 dentalimplants simultaneously installed. The lateral sinus augmentation cases were allocated randomly into 3groups: Group A comprised 13 procedures and 21 dental implants utilizing solely deproteinized bovine bone.Group B involved 10 cases and 16 dental implants using deproteinized bovine bone mixed with leukocyteand
... Show MoreThe purpose of this study was to determine the influence of environmental pH on production of biofilms and virulence genes expression in Pseudomonas aeruginosa.
Among 303 clinical and environmental samples 109 (61 + 48) isolates were identified as clinical and environmental P. aeruginosa isolates, respectively. Clinical samples were obtained from patients in the Al-Yarmouk hospital in Baghdad city, Iraq. Waste water from Al-Yarmouk hospital was used from site before treatment unit to collect environmental samples. The ability of prod
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More