Objective; swine flu is known to be caused by influenza A subtypes H1N1,H1N2, H2N3, H3N1, and H3N2, was first proposed to be a disease related to human flu during the 1918 flu pandemic, Iraq face the epidemic of 2009, many patients admitted to the medical word of alkindy teaching hospital, the clinical features were observed and managed according to WHO protocols.
The aim of the study; is to asses some features of morbidity and mortality of swine flu epidemic admitted patients in 2009 in alkindy teaching hospital.
Methods; A total 131 patients with suspected influenza
admitted to Alkindy Teaching Hospital all complain of
fever more than 38c, sore throat with or without cough.
The admitted patients are of two main
groups
Objective; swine flu is known to be caused by influenza A subtypes H1N1,H1N2, H2N3, H3N1, and H3N2, was first proposed to be a disease related to human flu during the 1918 flu pandemic, Iraq face the epidemic of 2009, many patients admitted to the medical word of alkindy teaching hospital, the clinical features were observed and managed according to WHO protocols.
The aim of the study; is to asses some features of morbidity and mortality of swine flu epidemic admitted patients in 2009 in alkindy teaching hospital.
Methods; A total 131 patients with suspected influenza
admitted to Alkindy Teaching Hospital all complain of
fever more than 38c, sore throat with or without cough.
The admitted patients are of two main
groups
BACKGROUND: Cough-variant asthma (CVA) is a type of asthma in which the main symptom is a dry, non-productive cough. OBJECTIVE: The objective of the study was to evaluate the therapeutic effect of Montelukast in CVA and to investigate the prevalence of Montelukast in CVA. METHODS: A cross-sectional study was conducted on 30 patients with chronic cough at least 8 weeks using Montelukast at Al-Kindy Hospital over the period of January 2018‒March 2018. An interview using questionnaire was used to collect the data that were specifically prepared to meet the objective of study including age, sex, associated disease, exacerbation factors, and classical therapy. RESULTS: There was a reduction of the symptoms associated
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreBackground: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),
... Show More