A recurrent condition that affects up to 10% of people worldwide is gastric ulceration illness. The existence of gastric juice pH with the lowering of mucous defences is prerequisites for the development of chronic ulcers. The main variables affecting the mucosa susceptibility to damage include Helicobacter pylori (H. pylori) infections or non-steroidal anti-inflammatory medicines (NSAIDs). Proton pump inhibitors (PPIs) including histamine-2 (H2) receptor inhibitors, two common therapies for peptic ulcers, have been linked to side impacts, recurrence or a variety of pharmacological combinations. Conversely, therapeutic herbs or the chemicals they contain may be used to cure or eliminate a wide range of illnesses. Therefore, prominent pharmaceutical herbs that can be utilised to cure or avoid ulcers in the intestines are presented in this research.
Cryptosporidiosis is an intestinal protozoan parasitic disease that infects human and animals, caused by apicomplexan parasite belong to the genusof Cryptosporidium. The current study was done to record the infection rate of cryptosporidiosis in human and cattle, and genotype the clinical isolates of Cryptosporidium in Baghdad Province. A total of 265 stool sample were collected (150 from human and 115 from cattle) during the period from December 2016 to the May 2017. Cryptosporidial infection was detected using modified acid fast stain. DNA of the parasite was extracted from oocysts of positive fecal samples and nested PCR method was used for partial 60 kDa glycoprotein (gp60) gene amplification then sequence analysis for selected samples.
... Show MoreAbstract
The research aims to identify the role played by the strategic mind of human resources managers in reducing the levels of strategic drift that can face the organization, as the problem of research to overlook the importance of this role in monitoring and follow-up all the changes that may face the organization during the implementation of its strategy, therefore highlights the importance Research in providing a set of solutions to the problems faced by the researched organization and as far as the research variables, the researchers have adopted the descriptive analytical approach in the applied side, as adopted the questionnaire as a main tool for data collection, which was prepared based on a number of ready me
... Show MoreHuman cytomegalovirus (HCMV) has a worldwide distribution and common infections. The presence of HCMV genome and antigens has been detected in many kinds of human cancers. The proto-oncogene Her2/neu is overexpressed in 25% to 30% of human breast cancers and frequently associated with tumor aggressiveness and worse prognosis. Examination was applied to detect different HCMV antigens and to demonstrate their correlation with Her2/neu overexpression in breast cancer. The present study includes samples from 70 women of 60 breast cancer patients and 10 normal breast tissues. Formalin-fixed paraffin embedded tissue blocks were obtained from each woman according to ethical approval. Human cytomegalovirus early antigen expression was detected in 5
... Show MoreThe application of physiological oxygen (physoxia) concentrations is becoming increasingly commonplace within a mammalian stem cell culture. Human mesenchymal stem cells (hMSCs) attract widespread interest for clinical application due to their unique immunomodulatory, multi-lineage potential, and regenerative capacities. Descriptions of the impact of physoxia on global DNA methylation patterns in hMSCs and the activity of enzymatic machinery responsible for its regulation remain limited. Human bone marrow-derived mesenchymal stem cells (BM-hMSCs, passage 1) isolated in reduced oxygen conditions displayed an upregulation of SOX2 in reduced oxygen conditions vs. air oxygen (21% O2, AO), while no change was noted for either OCT-4 or NA
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit
... Show MoreThis study presented more than twenty books that dealt with the subject of (Weights of the Tawshih art), whether their study was independent and dedicated the art of Tawshih as a part of book. Therefore, the review of the sources and references on the art of the Tawshih is not specific for place or time, it was a broad and comprehensive review of all the places where the muwashahat appeared in the east and west, Andalusia was one of the most important areas covered by the study arbic Maghreb and Iraq. The art of tawshih took different forms according to the countries in which they appeared. Muwashahat is a new art that appeared in Andalusia, its main goal was to renew the Khalilian weights and to find the poetic rhythm that fits with the so
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreDue to the spread of “Deepfake” in our society and the impact of this phenomenon on politicians, celebrities, and the privacy of individuals in particular, as well as, on the other hand, its impact on the electoral process as well as financial fraud, all these reasons prompted us to present a research paper dealing with this phenomenon. This paper presents a comprehensive review of Deepfake, how it is created, and who has produced it. This paper can be used as a reference and information source for the methods used to limit deepfake by detecting forgeries and minimizing its impact on society by preventing it. This paper reviews the results of much research in the field of deepfake, as well as the advantages of each method, a
... Show MoreMulti-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the chara
... Show More