Background: psychiatric and behavioral side effects are
common in patients with epilepsy and it may represent an
intrinsic feature of the disease itself or a side effect of the
antiepileptic use. Our aim in the present study is to assess
the psychiatric side effects of Sodium Valproate and
Carbamazipine .as these drugs are the most commonly
used antiepileptic drugs in Iraq.
Methods: 80 patients with primary generalized epilepsy
on Carbamazipine and 50 patients on Sodium Valproate
were enrolled in the present study; all the patients were
assessed for any psychological disturbances using semistructural interview based on the tenth edition of the
international classification of the diseases(ICD 10)
adopted by WHO.
Results: thirty percent of patients taking Sodium
Valproate and (9%) of patients taking Carbamazipine
were found to have depression while (16%) of patients
taking Sodium Valproate and (20%) of patients taking
Carbamazipine were found to have anxiety. There were
no reported psychosis, suicidal attempts, cognitive deficit
and mania in both groups of patients in the present study.
Discussion: Carbamazipine is associated with lower rates
of psychological side effects than Sodium Valproate; this
result may be related to mood stabilization effects of
Carbamazipine.
Conclusion: Carbamazipine is preferred to Sodium
Valproate when the efficacy of both drugs is comparable.
Despite the antiplaque effect of mouth-rinsing with a combination composed of miswak (Salvadora persica L.) and green tea (Camellia sinensis var. assamica) extracts, no data are available regarding its effect on gingival tissue at the molecular level. This pilot study aimed to assess the effect of oral rinsing with this combination on gingival crevicular fluid (GCF) flow and IL-1β levels. Ten subjects rinsed with either the combination, 0.12% chlorhexidine gluconate (CHX) or distilled water without toothbrushing for 4 days after receiving baseline polishing. GCF IL-1β concentration, influx, resting volume and plaque quantity were measured at baseline and after 4 days for each intervention. No significant differences in GCF flow or
... Show MoreAbstract
The present study aims to assess the knowledge, attitude, and experience of off-label prescribing practice among physicians in Baghdad city hospitals. This cross-sectional study was performed through the period from November 1st 2018 to March 2019 at 17 hospitals, a self-administered questionnaire was utilized to collect data from the physicians, and the targeted hospitals were randomly selected at different regions in Baghdad City area. Out of the 400 distributed questionnaires to the physicians, 383 of them were returned completed, 57.2% indicated that they were reasonably familiar with the term “off label drug”, 57.7% mentioned that the most common medical reasons for the prescribing o
... Show MoreThe aim of this study to investigate the microbial load and type of preservative for the types of yogurt available in the Iraqi market to ensure the safety of food provided to the consumer and protect through examining the types of yogurt from harmful bacteria as well as to contain ratios acceptable to yeasts and molds is to find out by comparing models curd careless Iraqi standard quality(ISQ) and see how they conform to these specifications have been collecting 12 brands of yoghurt types it was been (Kala, Activia 1, Activia 2, Mazia, Shelan, Aib, Mersin, Morsi, Al-Safi, Zabady, Zakho, Arbil). Bacteriological tests were conducted on samples of yogurt (total bacterial count, coliform count, counting yeasts and molds). The results showed
... Show MoreSpecies of genus Chrotogonus (surface grasshoppers) are phytophagous and damaging to various economical important plants in their seedling stages. In order to know the biodiversity of surface grasshoppers, the detailed study has been conducted from four provinces of Pakistan. During this study, biodiversity, taxonomy, diagnosis, morphometric analysis, habitat, global distribution, and remarks of each species have been described. Total of 826 specimens were collected and sorted out into three species and three subspecies: C. (Chrotogonus) homalodemus homalodemus (Blanchard, 1836), C. (Chrotogonus) homalodemus (Blanchard, 1836), C. (Chrotogonus) trachypter
... Show MoreSurvival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re
... Show MoreCoupling reaction of ( 4-amino antipyrene) with the (L- tyrosine ) gave the new azo ligand 2- ( 4- Antipyrene azo ) - tyrosine .Treatment of this ligand with metal ions (Mn(II) ,Co(II), Ni(II), and Cu(II) )in ethanolic medium in (1:2) (M:L) ratio yield a series of a neutral complexes of the general formula [M(L)2] . The prepared complexes were characterized using flame atomic absorption , FT.IR , UV-Vis spectroscopic and elemental microanalysis (C.H.N) as well as magnetic susceptibility and conductivity measurement
Beyond the immediate content of speech, the voice can provide rich information about a speaker's demographics, including age and gender. Estimating a speaker's age and gender offers a wide range of applications, spanning from voice forensic analysis to personalized advertising, healthcare monitoring, and human-computer interaction. However, pinpointing precise age remains intricate due to age ambiguity. Specifically, utterances from individuals at adjacent ages are frequently indistinguishable. Addressing this, we propose a novel, end-to-end approach that deploys Mozilla's Common Voice dataset to transform raw audio into high-quality feature representations using Wav2Vec2.0 embeddings. These are then channeled into our self-attentio
... Show MoreThe 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .
In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.
Note:- ns : small sample ; nm=median sample
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More