To determine the relationship between Helicobacter pylori infection and skin disorders, sixty six patients who suffering from skin diseases include chronic urticarial (CU) and atopic dermatitis (AD) who attended at Dermatological Clinic/ Al-Numan Teaching Hospital from the beginning of October 2015 to the end of January 2016 with age (6-62) have been investigated and compared to twenty two samples of apparently healthy individuals were studied as control group. All the studied groups were subjected to measurement of antiHelicobacter pylori IgG antibodies by enzyme linked immuno sorbent assay (ELISA) and detection of 16S rRNA and CagA genes by using singleplex and multiplex PCR methods. The results of current study revealed that there was a highly significant elevation (P<0.01) in concentration of H. pylori IgG antibodies in sera of the CU and AD patients compared with control group, also the results revealed that there was a significant elevation (P<0.05) in concentration of H. pylori IgG antibodies in sera of the CU patients compared with control group, and significant elevation (P<0.05) in concentration of H. pylori IgG antibodies in sera of AD patients compared with control group. The results of present study indicated that 26(66.67%) patients out of 39 CU patients were positive for both of 16S rRNA and CagA genes, while 13(33.33%) patients out of 39 CU patients were negative for those genes. Also, the results revealed that 19(70.37%) patients out of 27 AD patients were positive for both of 16S rRNA and CagA genes, whereas only 8(29.62%) were negative for both those genes comparing with control group which showed 1(4.54%) individuals out of 22 apparently healthy individuals were positive for both 16S rRNA and CagA genes, the statistical analysis was highly significant (P<0.01).
Inflammatory bowel disease includes both Crohn’s disease and ulcerative colitis, is a chronic, progressive relapsing disease of gastrointestinal tract that require long-term treatment or maintenance therapy. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an important factor that affects compliance of the patient in whom having positive beliefs is a prerequisite for better compliance. The aim of the current study was to investigate and assess beliefs about medicines among a sample of Iraqi patients with inflammatory bowel disease and to determine possible association between these beliefs and some patient-specific factors.
This study is a cross-sectional study carried out o
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCovalent modification of protein by drugs may disrupt self-tolerance, leading to lymphocyte activation. Until now, determination of the threshold required for this process has not been possible. Therefore, we performed quantitative mass spectrometric analyses to define the epitopes formed in tolerant and hypersensitive patients taking the β-lactam antibiotic piperacillin and the threshold required for T cell activation. A hydrolyzed piperacillin hapten was detected on four lysine residues of human serum albumin (HSA) isolated from tolerant patients. The level of modified Lys541 ranged from 2.6 to 4.8%. Analysis of plasma from hypersensitive patients revealed the same pattern and leve