To determine the relationship between Helicobacter pylori infection and skin disorders, sixty six patients who suffering from skin diseases include chronic urticarial (CU) and atopic dermatitis (AD) who attended at Dermatological Clinic/ Al-Numan Teaching Hospital from the beginning of October 2015 to the end of January 2016 with age (6-62) have been investigated and compared to twenty two samples of apparently healthy individuals were studied as control group. All the studied groups were subjected to measurement of antiHelicobacter pylori IgG antibodies by enzyme linked immuno sorbent assay (ELISA) and detection of 16S rRNA and CagA genes by using singleplex and multiplex PCR methods. The results of current study revealed that there was a highly significant elevation (P<0.01) in concentration of H. pylori IgG antibodies in sera of the CU and AD patients compared with control group, also the results revealed that there was a significant elevation (P<0.05) in concentration of H. pylori IgG antibodies in sera of the CU patients compared with control group, and significant elevation (P<0.05) in concentration of H. pylori IgG antibodies in sera of AD patients compared with control group. The results of present study indicated that 26(66.67%) patients out of 39 CU patients were positive for both of 16S rRNA and CagA genes, while 13(33.33%) patients out of 39 CU patients were negative for those genes. Also, the results revealed that 19(70.37%) patients out of 27 AD patients were positive for both of 16S rRNA and CagA genes, whereas only 8(29.62%) were negative for both those genes comparing with control group which showed 1(4.54%) individuals out of 22 apparently healthy individuals were positive for both 16S rRNA and CagA genes, the statistical analysis was highly significant (P<0.01).
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis study provides valuable information on secondary microbial infections in H1N1 patients compared to Seasonal Influenza in Iraqi Patients. Nasopharynx swabs were collected from (12 ) patients infected with Seasonal influenza (11 from Baghdad and 1 Patient from south of Iraq) ,and ( 22 ) samples from patients with 2009 H1N1 ( 20 from Baghdad and 2 from south of Iraq). The results show that the patients infected with 2009 H1N1 Virus were younger than healthy subjects and those infected with seasonal influenza. And the difference reached to the level of significance (p< 0.01) compared with healthy subjects.Two cases infected with 2009 H1N1 virus (9.1%) were fro
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe normalized difference vegetation index (NDVI) is an effective graphical indicator that can be used to analyze remote sensing measurements using a space platform, in order to investigate the trend of the live green vegetation in the observed target. In this research, the change detection of vegetation in Babylon city was done by tracing the NDVI factor for temporal Landsat satellite images. These images were used and utilized in two different terms: in March 19th in 2015 and March 5th in 2020. The Arc-GIS program ver. 10.7 was adopted to analyze the collected data. The final results indicate a spatial variation in the (NDVI), where it increases from (1666.91 𝑘𝑚2) in 2015 to (1697.01 𝑘𝑚2)) in 2020 between the t
... Show MoreBackground: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreGallstone disease is one of the most common complications among diabetic patients especially type 2 DM. Till now, there is no specific and certain factor that explain the incidence of gallstones among type 2 diabetic patients and many risk factors are taken collectively to estimate its intensity and severity compared to non diabetic counter parts. This clinical study was designed to evaluate and report the incidence and severity of gallstones among type 2 diabetics and non diabetics regarding certain factors. 20 diabetic females and 20 diabetic males were collected as patients′ group and have had gallstones while 20 females and 20 males who have had gallstones without diabetes mellitus type 2 were collected as controls′ group
... Show MoreBackground: Diabetes mellitus (DM) is a significant cause of visual impairment; many diabetics do not have regular eye examinations, although it is known that early diagnosis and reduces the risk of blindness. There were many barriers that prevent diabetics from attending eye clinics.
Objectives: To assess knowledge, and practice about ocular complications among diabetic patients and to determine barriers preventing the diabetic patients annual visual checking
Methods: A cross-sectional study involving the interview was conducted among 300 diabetic patients attending out patient in Ibn Al Haitham Teaching Ophthalmology Hospital between November 2017 and June 2018.
... Show More