Background: Background : Patients with non-rheumatic atrial fibrillation have high risk of thromboembolism especially ischemic stroke usually arising from left atrial appendage .Transoesophageal echocardiography provides useful information for risk stratification in these patients as it detects thrombus in the left atrial or left atrial appendage. Objective : This study was conducted at Al-Kadhimiya Teaching Hospital to assess the prevalence of left atrial chamber thrombi in patients with chronic non-rheumatic atrial fibrillation using transoesophageal echocardiography and its clinical significance as well as to verify the superiority of transoesophageal over transthoracic echocardiography in the detection of these abnormalities. Type of
... Show MoreBackground: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreObesity is a disease describe a case of excessive accumulation of body fats. Obesity is linked to the morbidity of human health, such as the development of hypertension. The study designed to investigate the levels of glucose, urea, creatinine, and lipid profile parameters in sera of obese female and hypertensive obese female. The study included 90 subjects who divided onto three groups equally, in which they are healthy control, normotensive obese, and hypertensive obese. A significant elevation (P<0.01) has observed in the level of glucose, urea, creatinine, triglycerides (TGs), cholesterol, LDL-C, and VLDL-C in obese females compared with control, yet only TGs and VLDL-C were si
Determination of the level of adipokines (obestatin, vaspin, tumor necrosis factor-? and interleukin-6)in hypo-and hyperthyroid patients from Educational Baghdad Hospital in Baghdad City was investigated. Fifty patients with hypothyroidism and Fifty patients with hyperthyroidism were selected. A control group of thirty euthyroid persons was included. Blood was collected by vein puncture and serum was separated and stored at –20C. Adipokines (obestatin, vaspin, tumor necrosis factor-? and interleukin-6) were estimated using ELISA method. The findings show a significant (p<0.05) increase in obestatin level in hypothyroid patients, while there is no significant difference in hyperthyroid patientsas compared with the euthyroid subjects.
... Show More