Preferred Language
Articles
/
CRfbFpMBVTCNdQwCYMb7
Isolation and Detection of Candida tropicalis from Aborted Placenta in Al-Najaf city/Iraq
...Show More Authors

Background: Candida tropicalis is one of the most causes of vulvovaginal candidiasis (VVC) in women. Systemic candidiasis and candidemia may also occur in pregnancies. Objective: This study was carried out to detect and isolate of this yeast from aborted placenta, which may cause severe complications such as spontaneous abortion. Materials and methods: Fresh aborted placenta were collected and washed by normal saline to remove the blood. Then, cut it into portions and place it in test tube containing 5 ml of normal saline. Finally, shake for 10 minutes, after that, cultured for microbial isolation. Isolation and detection were done by some conventional methods with Api candida and CHROMagar. Results: The results showed that four isolates of C. tropicalis (2%) were isolated from two hundreds samples from placenta of aborted women. Conclusions: Even with its rare occurrence, C. tropicalis has the ability to initiate intrauterine infection.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
The Iraqi Postgraduate Medical Journal
Comparative Study Between Glimepiride and Glibenclamide in the Treatment of Type 2 Diabetic Patients in Al-Yarmouk Hospital
...Show More Authors

Comparative Study Between Glimepiride and Glibenclamide in the Treatment of Type 2 Diabetic Patients in Al-Yarmouk Hospital

View Publication
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The aesthetics of the sculptural formulations of swords in the Al-Kafeel Museum of Treasures and Manuscripts
...Show More Authors

The research included (the aesthetics of the sculptural formulations of swords in the Al-Kafeel Museum) four chapters. Al-Kafeel Museum.)
Within the time period: (1240 AH / (1824 and 1825) AD - 1312 AH / (1894 and 1895) AD). The second: the types of Islamic swords. The third chapter included (research procedures), and the analysis of samples from the sample (3) as a model according to the descriptive approach, and the fourth chapter dealt with (results, conclusions, recommendations, and proposals). As well as recommendations, proposals and sources.

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 02 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Quantitative detection and correlation of Epstein - Barr Virus in plasma with gingivitis and severity of chronic periodontitis by using real-time polymerase chain reaction technique
...Show More Authors

Background: The main purpose of this study is to find if there is any correlation between the level of C-reactive protein (CRP) in gingival crevicular fluid with its serum level in chronic periodontitis patients and to explore the differences between them according to the probing depth. Materials and methods: Forty seven male subjects enrolled in this study. Thirty males with chronic periodontitis considered as study group whom further subdivided according to probing depth into subgroup 1 with pocket depth ≤6mm, subgroup 2 with pocket depth >6mm. The other 17 subjects considered as controls. For all subjects, clinical examination where done for periodontal parameters plaque index (PLI), gingival index (GI), bleeding on probing (BOP),

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Biodiversity Index value of benthic invertebrates' community in relation with variation of some environmental properties in Rivers Tigris and Diyala within Baghdad city.
...Show More Authors

This study was carried out to determine the effects of some environmental variables on biodiversity index value of benthic invertebrates' community in samples that collected monthly from two adjacent sites nearby the confluence of Tigris and Diyala rivers within Baghdad city that’s from November 2007 - October 2008. Results showed differences in chemical and physical characteristics for each river. Where the annual averages of these characteristics in Rivers Tigris and Diyala respectively for: water temperature (20, 19) Cº, pH (8, 8), Dissolved oxygen DO(8,4 ) mg/l , EC(1152,2979)µc/cm , Turbidity (28,74) NTU, Total Hardness of CaCO3 (485,823)mg/l, and finally NO3 (4,6)mg/l. Concerning the biological groups, included types of Insect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref