The present study was conducted as atrial to treat secondary hydatidosis in white mice of species Mus musculus. (Balb/c strain), experimentally infected with secondary hydatid cysts of sheep origin. The immunization process was carried by using CF/PS antigen which consist hydatid cyst fluid (CF) antigen, and protoscolices (PS) antigen mixed together and by using two concentrations 7.5, 15 mg/ml. Then derivatives of Benzimidazole, Mebendazole (M) and drugs Albendazole (A) were used 10 and 40 μm/gm body weight respectively. The mixture of drugs was used one week after challenged dose. Criteria taken into consideration to define the activity of the immunization and chemotherapy in this study were reduction in the numeral of cysts, the coeffic
... Show MoreRivers Tigris and Euphrates, as well as the wetlands in southern Iraq and the Diyala River, were all included in the evaluation of earlier studies on the variety and factors impacting fish in Iraqi waters. Different studies documented different types, and the number of species recorded varied between the studies, which could be explained by the registration of some species, synonyms, differs from the registration of some species with synonymous names By mistake, as well as recording new species in times that followed some previous studies, Also, the difference in some factors, including the pollution of some waterways, leads to a difference in the existing species, so we find the presence of species that are tolerant of pollution. There are
... Show MoreBackground: There are so many evidences that there was antimicrobial resistance, and there were many strains that emerged which were difficult to treat. We are living in a situation that the dissemination of multiple drug resistant bacteria can lead us to the situation, in which no treatment could be offered for bacterial infection in future.
Aim of study: Assessment of nurses’ knowledge, attitude, and practices on antibiotic use and resistance in Fatima Al Zahra hospital in Baghdad.
Subjects and Methods: A cross-sectional study. The study was carried on from 1st of February to 31st of March 2021. A questionnaire was constructed by the research team based on literature review and was adapted to asses
... Show Moreserum amylase occurs in cases of perforated peptic ulcer partly as a result of increase leakage of pancreatic enzymes rich fluid from the perforation site with subsequent absorption by peritoneal lymphatics & partly due to damage of pancreases by digestive enzymes that spilled through the perforation.
Objectives: To determine the significance of abnormally high level of serum amylase in patients undergone operation for PDU, to study the factors that tend to bring about elevated serum amylase level in these patients.
Patients and Methods: A prospective study of 250 patients with perforated duodenal ulcer (PDU) at al kindy teaching hospital, Baghdad, Iraq from June 2008- august 2010. patients were examined clinically and investig
In this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More
The present work aims to study the efficiency of coagulation/ flocculation as 1st stage, natural gravity water filter or microfiltration (MF) as 2nd stage and nanofiltration (NF) technology as final stage for treatment of water of main outfall drain (MOD) for injection in Nasiriyah oil field. Effects of operating parameters such as coagulant dosage, speed and time of slow mixing step and settling time in the 1st stage were studied. Also feed turbidity and total suspended solids (TSS) in the 2
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
A Multiple System Biometric System Based on ECG Data
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More