Preferred Language
Articles
/
VBd2Zo8BVTCNdQwCwHaz
Immunological and molecular detection of Helicobacter pylori in patients clinically diagnosed with chronic urticarial and atopic dermatitis
...Show More Authors

To determine the relationship between Helicobacter pylori infection and skin disorders, sixty six patients who suffering from skin diseases include chronic urticarial (CU) and atopic dermatitis (AD) who attended at Dermatological Clinic/ Al-Numan Teaching Hospital from the beginning of October 2015 to the end of January 2016 with age (6-62) have been investigated and compared to twenty two samples of apparently healthy individuals were studied as control group. All the studied groups were subjected to measurement of antiHelicobacter pylori IgG antibodies by enzyme linked immuno sorbent assay (ELISA) and detection of 16S rRNA and CagA genes by using singleplex and multiplex PCR methods. The results of current study revealed that there was a highly significant elevation (P<0.01) in concentration of H. pylori IgG antibodies in sera of the CU and AD patients compared with control group, also the results revealed that there was a significant elevation (P<0.05) in concentration of H. pylori IgG antibodies in sera of the CU patients compared with control group, and significant elevation (P<0.05) in concentration of H. pylori IgG antibodies in sera of AD patients compared with control group. The results of present study indicated that 26(66.67%) patients out of 39 CU patients were positive for both of 16S rRNA and CagA genes, while 13(33.33%) patients out of 39 CU patients were negative for those genes. Also, the results revealed that 19(70.37%) patients out of 27 AD patients were positive for both of 16S rRNA and CagA genes, whereas only 8(29.62%) were negative for both those genes comparing with control group which showed 1(4.54%) individuals out of 22 apparently healthy individuals were positive for both 16S rRNA and CagA genes, the statistical analysis was highly significant (P<0.01).

Publication Date
Sun Mar 01 2026
Journal Name
Journal Of Molecular Structure
Synthesis, characterization, DFT calculations, molecular docking, ADMET analysis and biological activity of Schiff base metal complexes against colon cancer cells
...Show More Authors

Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Levels of Glucose-6-phosphate Dehydrogenase in Type 1 Diabetes Mellitus patients with Nephropathy and Cardiovascular disease complication: Perry H. Saifullah|Saad M. Nida|Israa B. Raoof
...Show More Authors

The aim of this study is to evaluate oxidative stress in diabetes mellitus (DM) Type1 by the measurement of Glucose-6-phosphate Dehydrogenase (G-6-PD), an enzyme expressed in human RBCs, is important in the generation of reduced glutathione which is the key product in oxidative stress controls. The Study was carried on 80 samples of blood and serum of National Diabetes Center (NDC). The study groups under fasting conditions and they divided as:20 samples of diabetes mellitus patients without complications and 20 samples of diabetes mellitus with cardiovascular (CV) complications and 20 samples of diabetes mellitus with Nephropathy (Neph) complications compared with 20 control group with average age (13-67) years.. The results sh

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Mar 03 2022
Journal Name
Archives Of Rheumatology
Association of tumor necrosis factor-alpha promoter region gene polymorphism at positions -308G/A, -857C/T, and -863C/A with etanercept response in Iraqi rheumatoid arthritis patients
...Show More Authors

Objectives: This study aims to evaluate the association between polymorphisms in the promoter region of the tumor necrosis factor-alpha (TNF-α) gene at locations -308G/A, -857C/T, and -863C/A with the tendency of being non-responder to etanercept.

Patients and methods: Between October 2020 and August 2021, a total of 80 patients (10 males, 70 females; mean age: 50 years; range, 30 to 72 years) with rheumatoid arthritis (RA) receiving etanercept for at least six months were included. The patients were divided into two groups responders and non-responders, based on their response after six months of continuous treatment. Following polymerase chain reac

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun May 10 2020
Journal Name
Baghdad Science Journal
Prevalence of Quinolones Resistance Proteins Encoding Genes (qnr genes) and Co-Resistance with β-lactams among Klebsiella pneumoniae Isolates from Iraqi Patients
...Show More Authors

This study investigated the prevalence of quinolones resistance proteins encoding genes (qnr genes) and co-resistance for fluoroquinolones and β-lactams among clinical isolates of Klebsiella pneumoniae.  Out of 150 clinical samples, 50 isolates of K. pneumoniae were identified according to morphological and biochemical properties. These isolates were collected from different clinical samples, including 15 (30%) urine, 12 (24%) blood, 9 (18%) sputum, 9 (18%) wound, and 5 (10%) burn. The minimum inhibitory concentrations (MICs) assay revealed that 15 (30%) of isolates were resistant to ciprofloxacin (≥4µg/ml), 11 (22%) of isolates were resistant to levofloxacin (≥8 µg/ml), 21 (42%) of isolates were re

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref