Stool speeimens were collected from pati nts who presented for various medical c:omplaints in out patien.t Laboratories (The Central Health Laboratories / Baghdad,). Every ,$pecim-en wa:s examined by Conventional m jcroscopic exatninatitnl (CME) ·and te.§t d, by IgG ELISA kit.
Antibody against d1e Entamoeba histolylica, det cted by ELISA, has ·the potential to become a vah,mble adjunct to blood diagn9stics and make it more affective, .although there is no repJacement fo'e the
rp.iorosGopicex
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThe implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiven
... Show MoreThis study was done to determine the concentration of several heavy metals in the water of Al-Saddah agricultural drainage in Al-Saddah District in Babylon Province/Iraq. The concentrations of six heavy metals were measured (Pb, Cd, Cu, Hg, Fe, Zn). It was found that Pb concentration ranged from 0.06 mg/L at St.2 in autumn to 0.13 mg/L at St.2 in winter. Fe concentrations ranged from 0.04 mg/L at St.2 in autumn and winter to 0.41 at St.2 in Summer. Cd concentrations ranged from 0.008 mg/L at St.2 in summer to 0.05 mg/L at St.2 in winter. Cu concentrations ranged from 0.01 mg/L at St.1 in both autumn and winter to 0.63 mg/L at St.2 in winter. Hg concentrations was ranged from 0.002 mg/
This study aims to evaluate drinking water quality at the Al Wahda plant (WTP) in Baghdad city. A conventional water treatment plant with an average flow rate of 72.82 MLD. Water samples were taken from the influent and effluent of the treatment plant and analyzed for some physicochemical and biological parameters during the period from June to November 2020. The results of the evaluation indicate that treated water has almost the same characteristics as raw water; in other terms, the plant units do not remove pollutants as efficiently as intended. Based on this, the station appears to be nothing more than a series of water passage units. However, apart from Total dissolved solids, the mean values of all parameters in the study were
... Show MoreThis study aims to evaluate drinking water quality at the Al Wahda plant (WTP) in Baghdad city. A conventional water treatment plant with an average flow rate of 72.82 MLD. Water samples were taken from the influent and effluent of the treatment plant and analyzed for some physicochemical and biological parameters during the period from June to November 2020. The results of the evaluation indicate that treated water has almost the same characteristics as raw water; in other terms, the plant units do not remove pollutants as efficiently as intended. Based on this, the station appears to be nothing more than a series of water passage units. However, apart from Total dissolved solids, the mean values of all parameters in th
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More