Preferred Language
Articles
/
rxioDZUBVTCNdQwC2iTi
Molecular and Serologic Detection of HLA-B27 among Ankylosing Spondylitis Patients with Some Clinical Correlations
...Show More Authors

BACKGROUND: HLA-B27 can effect clinical presentation and course of ankylosing spondylitis. Different detection techniques of HLA-B27 are available with variable sensitivities and specificities. OBJECTIVE: To compare serologic and molecular diagnostic techniques of detecting HLA-B27 status and to correlate it with some clinical variables among ankylosing spondylitis patients. PATIENTS AND METHODS: A cross-sectional study was conducted on 83 Iraqi patients with ankylosing spondylitis. Clinical and laboratory evaluations were reported. HLA-B27 status was determined in all patients by real-time PCR using HLA-B27 RealFast™ kit; ELISA method was used as well to detect soluble serum HLA-B27 antigens using Human Leukocyte Antigen® kit. RESULTS: The mean age of patients ± SD was (38.4±9.8) years. Male to female ratio was 9:1. Disease onset occurred <30 years in 78% of cases. All (100%) cases had lower back pain, 44 (54%) patients had enthesitis, 14 (16.9%) had peripheral arthritis, 12 (14.5%) had eye involvement, whil

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Early detection of first degree relatives to type-II diabetes mellitus
...Show More Authors

Objective(s): The study aims to assess the early detection of early detection of first degree relatives to type-II
diabetes mellitus throughout the diagnostic tests of Glycated Hemoglobin A1C. (HgbA1C), Oral Glucose Tolerance
Test (OGTT) and to find out the relationship between demographic data and early detection of first degree
relatives to type-II diabetes mellitus.
Methodology: A purposive "non-probability" sample of (200) subjects first degree relatives to type-II diabetes
mellitus was selected from National Center for Diabetes Mellitus/Al-Mustansria University and Specialist Center
for Diabetes Mellitus and Endocrine Diseases/Al-kindy. These related persons have presented the age of (40-70)
years old. A questio

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of The College Of Education For Women
Unemployment among the youth
...Show More Authors

The research talked about one of the important social subject that care public so cities which is .
This subject deals with three subdivisions papers :-
The first one deals with the reasons of unemployment mentioned the definition of it in addition to make a comparison between it and inertia . then talked specially about unemployment that had got in our wounded country become of wars in it .
It had a branch talked about in Islamic society .
The second one deals with the negative results of unemployment specially economic , moral and social with their roles in spreading negative phenomenon in our society as terrorist , stolen … etc …
The third one deals with the ways of reducing unemployment and trying to limit it , tha

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Ambivalence among University students
...Show More Authors

The current research was aimed at the following:
1. Measurement the Ambivalence among University students.
2. Identify the differences in Ambivalence among University students according to variable of Specialization (scientific / literary).
To achieve this aims of the research, the researcher set up the instrument is scale of Ambivalence that consistent (19) item. And the researchers applying this scale on the sample amounted to (200) among University students. Then after data processing statistically, the researchers reached the following results:
1. University students have Ambivalence.
2. There is no is differences in Ambivalence among University students according to variable of Specialization (scientific / literary).<

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 07 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Types of Violence among Adolescents
...Show More Authors

Objective(s): To assess the types of violence among adolescents in Baghdad City.
A descripƟve study which was using the assessment approach was conducted on purposive sample of 60 parents of
adolescent for identify types of adolescents violence in their families, was selected according to specific criteria for
participating in health education program towards adolescents' violence control in Baghdad city.
Methodology: A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first
part which included the parents' demographic characteristics for parents (sex, age, educational level and socioeconomic
status); the second part included types of adolescent violence that reported by par

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 28 2023
Journal Name
The Journal Of Physical Chemistry A
Tubular Magnetic Shielding Scan (TMSS): A New Technique for Molecular Space Exploration. (i) The Case of Aromaticity of Benzene and [<i>n</i>]Paracyclophanes
...Show More Authors

Both traditional and novel techniques were employed in this work for magnetic shielding evaluation to shed new light on the magnetic and aromaticity properties of benzene and 12 [n]paracyclophanes with n = 3–14. Density functional theory (DFT) with the B3LYP functional and all-electron Jorge-ATZP and x2c-TZVPPall-s basis sets was utilized for geometry optimization and magnetic shielding calculations, respectively. Additionally, the 6-311+G(d,p) basis set was incorporated for the purpose of comparing the magnetic shielding results. In addition to traditional evaluations such as NICS/NICSzz-Scan, and 2D-3D σiso(r)/σzz(r) maps, two new techniques were implemented: bendable grids (BGs) and cylindrical grids (CGs) of ghost atoms (Bqs). BGs a

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jan 12 2013
Journal Name
Pierb
RADAR SENSING FEATURING BICONICAL ANTENNA AND ENHANCED DELAY AND SUM ALGORITHM FOR EARLY-STAGE BREAST CANCER DETECTION
...Show More Authors

A biconical antenna has been developed for ultra-wideband sensing. A wide impedance bandwidth of around 115% at bandwidth 3.73-14 GHz is achieved which shows that the proposed antenna exhibits a fairly sensitive sensor for microwave medical imaging applications. The sensor and instrumentation is used together with an improved version of delay and sum image reconstruction algorithm on both fatty and glandular breast phantoms. The relatively new imaging set-up provides robust reconstruction of complex permittivity profiles especially in glandular phantoms, producing results that are well matched to the geometries and composition of the tissues. Respectively, the signal-to-clutter and the signal-to-mean ratios of the improved method are consis

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sun Dec 25 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection of Epicatechin in Camellia sinensis Leaves by Thin Layer Chromatography and High Performance Liquid Chromatography Techniques
...Show More Authors

    The current study performed in order to detect and quantify epicatechin in two tea samples of Camellia sinensis (black and green tea) by thin layer chromatography (TLC) and high performance liquid chromatography (HPLC). Extraction of epicatechin from black and green tea was done by using two different methods: maceration (cold extraction method) and decoction (hot extraction method) involved using three different solvents which are  absolute ethanol, 50% aqueous ethanol and water  for both extraction methods using room temperature and direct heat respectively. Crude extracts of two tea samples that obtained from two methods were fractionated by using two solvents with different polarity (chloroform and

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF