Background: Ultrasound is a valuable tool for evaluating fetal problems throughout pregnancy. Amniotic fluid anomalies have been associated with unfavorable maternal, fetal, and obstetrical outcomes. Objective: To determine the effect of echogenic amniotic fluid during term pregnancy on the presence of meconium stain liquor and pregnancy outcome. Methods: A cross-sectional study was conducted on 1080 term pregnant women who visited Al-Elwiya Maternity Teaching Hospital from May 1st, 2021, to May 1st, 2023. Ultrasound was used to analyze echogenic amniotic fluid and turbid liquor. The liquor state was tested either after an artificial membrane rupture in the vaginal delivery trial or during a cesarean section. Results: Echogenic amniotic fluid or turbid liquor was detected in 120 cases, while clear liquor was found in 960. Meconium-stained amniotic fluid was discovered in 39 of the 120 instances with turbid liquor, whereas bloody liquor was found in four. In contrast, clear fluid with vernix caseosa was identified in 55 cases, while just 22 cases had clear liquor. Clear liquor was found in 640 of the 960 cases, vernix caseosa liquor in 200, and meconium-staining liquor in only 120 cases. Conclusions: The presence of echogenic amniotic fluid or turbid liquor increases the chance of meconium-stained liquor, but it could also be caused by vernix caseosa. Other indicators, such as fetal movement and the non-stress test, should be used to determine the manner of delivery.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research aims to introduce the general tax on sales in gordan and the most important concepts related to this type of taxes and identify the most on characteristics and stand on its role in supplying the general budget of the necessary fundig to cover the over head of the state and the factorsinfluencing it and whether such a tax has been able to chieve the desired goals.including in contribute to an important and growing role in puplic revenues or not to be able to achieve these goals through the use of descriptive and analytical technique based on the data and information relevant.wasreached some conclusion and recommendations was most important is that the general sales tax comes in
... Show MoreThe current research dealt with a vital subject contributing In success Iraqi Industrial Companies general and Iraqi Cement state company A market knowledge, It is one of the most important industrial companies that Which serve to fill the local market need Of cement without resorting to import, The problem of research was limited understanding of the importance of the role played market knowledge of the tendencies and desires of competitors, This in turn affects the company's ability to achieve competitive advantages,The research aims to know the extent of adoption Iraqi Cement state company Concept market knowledge And employment achieving Competitive advantage By removing them (Cost, and quality, and del
... Show MoreAs long as the place in which a person lives has a meaning and temporal dimensions , memory is the main axis of these dimensions , today , city centers and old historical sectors of cities are abandoned , and began to turn into slums , the contradiction between old and historical sectors led cities to lose their identity while people lost their sense of belongingness to the old sectors where their ancestors used to live . The old city of Hilla used to have social , historical and cultural role on determining the identity . The study problem can be summarized as the ( lack of studies regarding the impact of historical memory related to Hilla old city on social and cultural mobility ) , the study hypothesis claims that the social , histori
... Show MoreIn this work an enzyme linked immunosorbent assay (ELISA) technique has been used for detection of some inflammatory markers in serum of acute coronary syndrome (ACS)-Patients Admitted to the cardiac care unit (CCU) of Iraqi Centre For Heart Diseases and Ibn AlNafees Teaching Hospital. The present method includes quantitative measurement of interleukine-6 (IL-6) and C-reactive protein (CRP), as their increase during symptoms may be responsible for identifying the mechanism of myocardial damag, in addition to their best performance than other quantitative tests perhaps due to their association with atherosclerotic process that belongs to the endothelial dysfunction. Aim of this study is to estimate the prevalence and correlation of IL-6 w
... Show More