Human cytomegalovirus (HCMV) infection is ubiquitous and successfully reactivated in patients with immune dysfunction as in patient with multiple myeloma (MM), causing a wide range of life-threatening diseases. Early detection of HCMV and significant advances in MM management has amended patient outcomes and prolonged survival rates.
The aim of the study was to estimate the frequency of active HCMV in MM patients.
This is a case–control study involved 50 MM patients attending Hematology Center, Bag
To determine the relationship between Helicobacter pylori infection and Multiple Sclerosis (MS) disorder, 20 patients with MS aged (25-60) years have been investigated from the period of 2016/12/1 to 2017/3/1 and compared to 15 apparently healthy individuals. All study groups were carried out to measure anti H.pylori IgA and H.pylori IgG antibodies by enzyme linked immunosorbent assay (ELISA) technique. There was a significant elevation (p<0.05) in the concentration of anti H.pylori IgG and IgA antibodies (Abs) compared to control group, and there was no significant difference (p>0.05) in the concentration of IgA and IgG (Abs) of H.pylori according to gender, and there was no significant difference (p>0.05) in the concentration of IgA and I
... Show MoreThis paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that
Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreThe current research aims to identify the extent to which cognitive economics skills are included in the content of the chemistry textbook for the third intermediate grade, and the research sample was represented in the chemistry textbook for the third intermediate grade. A list of knowledge economy skills was prepared (6) main skills (basic skills, communication skills, thinking skills, work skills Group, information-gathering skill, behavioral skills (and (20) sub-skills) (reading, writing, operations, computer skills and employability, oral expression and written communication, dialogue, persuasion, influence and arousal, analysis, problem-solving, decision-making, suggestions and hypotheses and employing them. Controlling, directing
... Show MoreThe study was conducted during spring seasons of 2000 and 2001.The aim was to study the changes in the moisture content of sunflower plants during growth stages under hardening conditions to drought tolerance .Agricultural practices were made according to recommendation. Asplit-split plots design was used with three replications. The main plots included irrigation treatments:irrigation to100%(full irrigation),75and50%of available water. The sub plots were the cultivars Euroflor and Flame.The sub-sub plots represented four seed soaking treatments: Control (unsoaked), soaking in water ,Paclobutrazol solution(250ppm),and Pix solution(500ppm). The soaking continued for 24 hours then seeds were dried at room temperature until they regained t
... Show More