Epstein-Barr Virus (EBV) infection is associated with broad spectrum of clinical manifestationsdepending on the immune status of the host, To analyze their possible role in the complication ofautoimmune hepatitis, we investigated (30) female patients with autoimmune hepatitis type-1 of(10-40)years and 25 healthy female of same ages(control groups). Both groups were carried outto measure the levels of EBV-CA IgM, IgG Ab, EBV-EA IgM, IgG Ab, and EBV-NA IgM, IgGAb using indirect immunoflourescent assay (IFAT).The prevalence of EBV-CA IgM, IgG Ab were(10%,20%) and EBV-EA IgM, IgG Ab were (10% and20%) respectively, while the prevalence ofEBV-NA IgG Ab was( 3.33%) and there are no prevalence of EBV-NA IgM Ab. There weresignificant differences (P≤ 0.05) in percentage of EBV-CA IgG and EBV-EA IgG in patientsgroups compared to control groups, and no significant differences in percentage of EBV-CAIgM and EBV-EA IgM in patients group compared to control group. This indicates thatinfection with Epstien-Barr virus plays a role in the pathogenesis of autoimmune hepatitis type-1.
This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
In this investigation, the mechanical properties and microstructure of Metal Matrix Composites (MMCs) of Al.6061 alloy reinforced by ceramic materials SiC and Al2O3 with different additive percentages 2.5, 5, 7.5, and 10 wt.% for the particle size of 53 µm are studied. Metal matrix composites were prepared by stir casting using vortex technique and then treated thermally by solution heat treatment at 530 0C for 1 hr. and followed by aging at 175 0C with different periods. Mechanical tests were done for the samples before and after heat treatment, such as impact test, hardness test, and tensile test. Also, the microstructure of the metal matrix composites was examine
... Show MoreThe aim of this study was to provide an overall assessment to the efficiency of the Iraq stocks exchanges (ISE) through specifying well –known models .First, Fama's efficient market hypothesis as a contrary concept to the random walk hypothesis, was performed and it has been found that ISE follows the random process, so the price of the shares can't be predicated on the basis of past information. Second,we use a multifactor model, which so named multiple regression, to explore the link between ISE and the main economic indicators. our empirical analysis finds that every weak associations exists between major ISE measures and main economic indicators.
Abstract:
Objective: To self-evaluate the effect of SBAR (Situation, Background, Assessment, and Recommendation) educational program on nurse and midwives practices in maternal health report documentation accuracy.
Methods: A quasi- experimental design was carried with the application of pre- post test for nurses and midwives’ knowledge and practices regarding SBAR communication tool. The study was held in Al-Elwia maternity teaching hospital, Al –Karckh maternity hospital and Al-Yarmouk teaching Hospital. purposive sample as it was convenient with inclusion criteria consisted of (84) nurse and midwives. The questionnaire comprised of demographic data, nurses- midwives practices of SBAR using (5) level Likert scale for assessme
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreNew derivatives of Schiff bases were synthesized from the aldehyde derivative (Ma2) which was produced by reacting the mefenamic acid (Ma) with thionyl chloride to obtain the acid halide derivative (Ma1). Compound (Ma1) was dissolved in DMF and mixed with p-hydroxybenzaldehyde which was previously dissolved with pyridine to obtain the aldehyde derivative (Ma2). In the final step, derivatives of Schiff bases were synthesized by reacting the aldehyde (Ma2) with a number of different aromatic primary amines in the presence of glacial acetic acid to obtain the new derivatives Ma [3-10]. The new prepared compounds were characterized by melting points and with spectral data FT-IR, 13C-NMR and 1H-MNR (some of them). The vital effectiven
... Show More