Objective: Detection the presumptive prevalence of
silent celiac disease in patients with type 1 diabetes
mellitus with determination of which gender more
likely to be affected.
Methods: One hundred twenty asymptomatic patients
[75 male , 45 female] with type 1 diabetes mellitus
with mean age ± SD of 11.25 ± 2.85 year where
included in the study . All subjects were serologically
screened for the presence of anti-tissue transglutaminase
IgA antibodies (anti-tTG antibodies) by Enzyme-
Linked Immunosorbent Assay (ELISA) & total IgA
was also measured for all using radial
immunodiffusion plate . Anti-tissue transglutaminase
IgG was selectively done for patients who were
expressing negative anti-tissue transglutaminase IgA
with low total IgA levels & results were compared
to that obtained from healthy 60 persons with mean
age ± SD for them was 15.25 ± 3.85 year .
Results : Fourteen out of one hundred twenty (11.66
% ) diabetic patients had expressed positivity to antitissue
transglutaminase IgA compared to 1/60 ( 1.66
%) of non diabetic patients who had expressed such
positivity , P value equals to 0.0221 & it is
considered to be statistically significant. Three out of
one hundred twenty (2.5 % ) diabetic patients had
expressed total IgA deficiency whereas all of non
diabetic patients were expressing total IgA within
the normal range , P value equals to 0.55 & it is
considered to be not statistically significant. All of
three diabetic patients with total IgA deficiency were
not showing positivity to anti-tissue transglutaminase
IgG . Six mals & Eight female of those with type 1
diabetes mellitus had expressed positivity to anti-tissue
transglutaminase IgA , P value equals to 0.1426 &
it is considered to be not statistically significant .
Conclusion : There is an increased prevalence of IgA antitissue transglutaminase antibodies ( 11.66 % ) in children & adolescent with type 1 diabetes mellitus in comparison with control group.
Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn The Name of Allah Most Gracious Most Merciful
It is no secret to everyone that the endowment is an important nucleus for the prosperity of Islamic civilization, especially in the fields of education, health, economy, and defensive military actions that fall within the door of jihad, and so on. Al-Ashraf, Qom Al-Quds, Cairo, and other parts of the Islamic world. What we will see in the research.
Summary: The study focused on the role of the educational counselor in schools, as an integral part of the educational system that faces multiple challenges and difficulties. In this context, the counselor’s role becomes crucial in attempting to reduce or eliminate such difficulties, in addition to guiding students in an appropriate manner. Methodes: The study employed a descriptive field approach, using interviews and direct observation as tools to examine the actual role performed by school counselors. Results: The study concluded with several key findings, most notably the numerous challenges faced by counselors, including students’ negative behaviors, school dropouts, and the limited administrative support for counselors’ work. Fu
... Show MoreIn the present work, the magnetic dipole and electric quadrupole moments for some sodium isotopes have been calculated using the shell model, considering the effect of the two-body effective interactions and the single-particle potentials. These isotopes are; 21Na (3/2+), 23Na (3/2+), 25Na (5/2+), 26Na (3+), 27Na (5/2+), 28Na (1+) and, 29Na (3/2+). The one-body transition density matrix elements (OBDM) have been calculated using the (USDA, USDB, HBUMSD and W) two-body effective interactions carried out in the sd-shell model space. The sd shell model space consists of the active 2s1/2, 1d5/2,
... Show MoreThe present work involved four steps: First step include reaction of acrylamide ,N-?-Methylen-bis(acryl amide) and N-tert Butyl acryl amide with poly acryloyl chloride in the presence of triethyl amine (Et3N) as catalyst, the second step include homopolymerization of all products of the first step by using benzoyl peroxide(BPO) as initiator in (80-90)Co in the presence of Nitrogen gas(N2). In the third step the poly acrylimide which prepare in second step was convert into potassium salt by using alcoholic potassium hydroxide solution. Fourth step include Alkylation of the prepared polymeric salts in third step by react it with different alkyl halides(benzyl chloride, allylbromide , methyl iodide) by using DMF as solvent for(10-12) hours.
... Show More