Objective: To evaluate vitamin D deficiency in children with iron-deficiency anaemia, and to identify the risk factors for such deficiency.
Methods: The cross-sectional study was conducted at the Children's Hospital, Pakistan Institute of Medical Sciences, Islamabad, Pakistan, from October 2021 to March 2022, and comprised children aged 1-5 years who had been diagnosed with iron-deficiency anaemia. Quantitative variables, like age, height, weight, gender, socioeconomic status and sibling status, were controlled by stratification.
Background: NASPGHAN guidelines recommend regional antibiotic susceptibility profiling for H. pylori eradication treatment. Profiling local antibiotic resistance patterns is mandatory for successful H.
View Article and Find Full Text PDFFour affected individuals from a large consanguineous family were diagnosed with variable phenotypes of cholestasis based on their clinical laboratory and biopsy findings. Cholestasis is a condition when there is not enough bile flow between liver and small intestine. Two of the affected individuals (IV-1, IV-4) died of cholestatic liver at an early age, while the other two patients are alive with chronic liver disease.
View Article and Find Full Text PDFInterleukin 2 receptor alpha chain (IL-2Rα or CD25) deficiency (OMIM #606367) is an immune dysregulation disorder segregating in autosomal recessive form. The disease is caused by biallelic variants in the IL-2Rα gene encoding IL-2Rα also known as CD25 protein. IL-2Rα combines with γ and β chains of interleukin 2 receptor to form a functional interleukin 2 receptor (IL-2R).
View Article and Find Full Text PDFThe Internet of Things is a rapidly growing paradigm for smart cities that provides a way of communication, identification, and sensing capabilities among physically distributed devices. With the evolution of the Internet of Things (IoTs), user dependence on smart systems and services, such as smart appliances, smartphone, security, and healthcare applications, has been increased. This demands secure authentication mechanisms to preserve the users' privacy when interacting with smart devices.
View Article and Find Full Text PDF