Preferred Language
Articles
/
7RagM4oBVTCNdQwC4ZHy
Candida and Candidiasis - A review of Virulence Factors
...Show More Authors

   The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. Invasive Fungal diseases are result in very high morbidity as well as up to 60% mortality for people with severely susceptible hosts. This review will illustrate briefly the virulence factors in Candida albicans.  

Crossref
View Publication
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Estimation of Immunoglobulins and complements and Using Enzyme linked Immuno sorbant Assay in Identification of Vulvovaginal candidiasis
...Show More Authors

This study was conducted to determine the Immuno – globulins and complements quantitatively. The result revealed that the concentration of Immunoglobulin M(IgM) was increased significantly in patient group comparing with control group . The concentration of complement protein C4 was increased significantly in patient group comparing with control group.IgG of Candida albicans was detected by using ELISA Technique, the result indicated also that this antibody was found in 628% of the women who infected with Vulvovaginal Candidiasis. The sensitivity and specificity of the test were 63% and 89% respectively.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review
...Show More Authors

     As a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software across numerous fields and communities may now be processed through value chain networks. Despite the integration of all data networks, computing models, and distributed software that provides a broader cloud computing solution, the security solution is missing or inadequate, and more work is required to strengthen security requirements such as mutual entity trustworthiness, access controls, identity management, and data protection, all aspects of detecting and preventing attacks or threats. In order to combat cybersecurity threats, various international organizatio

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Review of Biosensors; Definition, Classification, Properties, and Applications
...Show More Authors

     Biosensor is defined as a device that transforms the interactions between bioreceptors and analytes into a logical signal proportional to the reactants' concentration. Biosensors have different applications that aim primarily to detect diseases, medicines, food safety, the proportion of toxins in water, and other applications that ensure the safety and health of the organism. The main challenge of biosensors is represented in the difficulty of obtaining sensors with accuracy, specific sensitivity, and repeatability for each use of the patient so that they give reliable results. The rapid diversification in biosensors is due to the accuracy of the techniques and materials used in the manufacturing process and the interrelationshi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Epidemiology of vaginal candidiasis among pregnant women attending Tikrit teaching hospital/Iraq.
...Show More Authors

Back ground: Vaginal candidiasis is the second common infection among child bearing women. The disease is caused by yeast organism especially Candida albican. Pregnancy is one of the risk factors of the disease. It has been revealed that more than 75 % of women may experience an attach of the disease during their life time.
Objectives: To study the epidemiological factors of vaginal candidiasis among pregnant women attending Tikrit teaching hospital out-patient clinic.
Patients and methods: The study was conducted on a sample of (120) pregnant women. The demographic and epidemiologic information was obtained according to special designed questionnaire. The study was done over a period from 1/3/2017 to 16/4/2017. Vaginal swabs were

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Tools for Drought Identification and Assessment: A Review
...Show More Authors

Drought is a natural phenomenon in many arid, semi-arid, or wet regions. This showed that no region worldwide is excluded from the occurrence of drought. Extreme droughts were caused by global weather warming and climate change. Therefore, it is essential to review the studies conducted on drought to use the recommendations made by the researchers on drought.  The drought was classified into meteorological, agricultural, hydrological, and economic-social. In addition, researchers described the severity of the drought by using various indices which required different input data.  The indices used by various researchers were the Joint Deficit Index (JDI), Effective Drought Index (EDI), Streamflow Drought Index (SDI), Sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review
...Show More Authors

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Digital Watermarking, Methodology, Techniques, and Attacks: A Review
...Show More Authors

 The use of multimedia technology is growing every day, and it is difficult and time-consuming to provide allowed data while preventing secret information from being used without authorization. The material that has been watermarked can only be accessed by authorized users. Digital watermarking is a popular method for protecting digital data. The embedding of secret data into actual information is the subject of digital watermarking. This paper examines watermarking techniques, methodologies, and attacks, as well as the development of watermarking digital images stored in both the spatial and frequency domains.

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2010
Journal Name
Oral Surgery, Oral Medicine, Oral Pathology, Oral Radiology, And Endodontology
Oral Candida flora in a group of Jordanian patients with β-thalassemia major
...Show More Authors

Objective Thalassemic patients present with multiple immune abnormalities that may predispose them to oral Candida, however this has not been investigated. The aim of this study was to assess oral candidal colonization in a group of patients with β-thalassemia major both qualitatively and quantitatively. Study design The oral mycologic flora of 50 β-thalassemia major patients and 50 age- and sex-matched control subjects was assessed using the concentrated oral rinse technique. Candida species were identified using the germ tube test and the Vitek yeast identification system. Results Oral Candida was isolated from 37 patients (74%) and 28 healthy subjects (56%; P = .04). The mean candidal count was significantly higher in thalassemic patie

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref