Background: Multiple sclerosis is a chronic autoimmune inflammatory demyelinating disease of the central nervous system of unknown etiology. Different techniques and magnetic resonance image sequences are widely used and compared to each other to improve the detection of multiple sclerosis lesions in the spinal cord. Objective: To evaluate the ability of MRI short tau inversion recovery sequences in improvementof multiple sclerosis spinal cord lesion detection when compared to T2 weighted image sequences. Type of the study: A retrospective study. Methods: this study conducted from 15thAugust 2013 to 30thJune 2014 at Baghdad teaching hospital. 22 clinically definite MS patients with clinical features suggestive of spinal cord involvement, patients were imaged with sagittal short tau inversion recovery sequences and sagittal T2 weighted. Results: The mean age of the patients was 32.5 ± 6.7years; female to male ratio was 2.7:1. The total number of spinal cord MS lesions was 44 of them 86.4% in the cervical spine, 68.2%of the lesions had less than one vertebra extension,79.6% of the lesions did not show changes in the spinal cord morphology. There was a significant upgrading in the lesions conspicuity at short tau inversion recovery sequence comparing to T2 weighted image, P<0.001. A significant difference had been found in artifact grading between both sequences; P<0.001. Conclusions: short tau inversion recovery magnetic resonance image sequences improve detection of MS spinal cord plaques compared with T2 weighted image and itincreasesthe conspicuity of the visualized T2weighted image lesions, but also it accentuates theartifacts more than T2weighted image.
Respiratory tract infections in sheep are among the important health problems that affect all sheep ages around the world. Nine bacterial isolates obtained from sheep with respiratory tract infections were selected to be used in the current study. The isolates included 3 Staphylococcus aureus, 4 Klebsiella pneumoniae, and 2 Pseudomonas aeruginosa. Following the primers design by the Primer3Plus software tool and optimization of the conventional polymerase chain reaction (PCR), the primers were validated for their use in the multiplex PCR experiments. The MFEprimer program was used to check the suitability of the primer set combinations for multiplex PCR. The MFEprimer software was successful in designing the multiplex-PCR experiments and de
... Show MoreBackground: The apical seal is the single most important factor in determining the success of surgical endodontics, the aim of this study was to compare the sealing ability of Mineral Trioxide Aggregate in three different cavity designs. Materials and Methods: Thirty extracted human single-rooted teeth were divided into three groups of ten teeth per group, a retrograde cavity preparation was carried out using a low speed handpiece and round bur with parallel walls in the first group, ultrasonic retrotip and unit in the second group and a low speed handpiece with a carbide inverted cone bur with undercuts in the third group, all the cavities were filled with MTA. microleakage was measured by dye penetration technique using methylene blue. Re
... Show MoreA simple, rapid, sensitive and inexpensive approach is described in this work based on a combination of solid‐phase extraction of 8‐hydroxyquinoline (8HQ), for speciation and preconcentration of Cr(III) and Cr(VI) in river water, and the direct determination of these species using a flow injection system with chemiluminescence detection (FI–CL) and a 4‐diethylamino phenyl hydrazine (DEAPH)–hydrogen peroxide system. At different pH, the two forms of chromium [Cr(III) and Cr(VI)] have different exchange capacities for 8HQ, therefore two columns were constructed; the pH of column 1 was adjusted to pH 3 for retaining Cr(III) and column 2 was adjusted to pH 1 for retaining of Cr(VI). The sorbe
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show More