Human herpes virus-8 (HHV-8) infection has increased recently in Arabic countries. HHV-8 in healthy persons does not necessarily cause life-threatening infection, and however, it causes a more severe infection among immunocompromised patients. The distribution of HHV-8 genotypes varies according to ethnicity and depends on the geographic region prior rapid development of global travel. A cross sectional prospective study included a hundred healthy blood donor samples with a mean age of (36.60±10.381), 81% were positive for molecular detection of HHV-8 DNA. PCR results for HHV-8 were strongly related with risk factors such as the number of sexual relations, previous surgeries, blood transfusion, dental operation, and the number of blood donations. In this study, genotypes (A, B, C and D) were detected, largely associated with blood donors residences and distributed to areas of Iraq through a map. Genotype A comprised 28 (34.6%) of blood donors and for genotype C it was 16 (19.8%) and both genotypes were found to be the predominant genotypes, followed by genotype B of 7 (8.7%) and D of 2 (2.5%), the latter is included into Mixed genotypes of 8 (9.9%), whereas, 22 (27.2%) were undetermined genotypes. Efforts should focus on these findings, which may indicate that Iraq is an endemic region of HHV-8 infection.
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show Morecontent Analysis for Some Type of Pillows used in Iraqi houses
The research aims to reveal the role of financial analysis in rationalizing the investor decision on the Iraqi stock Exchange market, by studying the relationship and impact techniques and methods of financial analysis on the decisions of investors in the market. The most important techniques and methods discussed in this study were: analysis (financial ratios analysis, comparison of financial statements analysis, cash flow statement analysis) for companies listed in the Iraqi stock Exchange market. The researcher adopted the analytical descriptive method which depends on the collection of data on the phenomenon and its interpretation. The questionnaire wa
... Show MoreThe study of images in the cognitive field receives considerable attention by researchers, whether in the field of media and public relations or in other humanities. Due to the great importance in shaping trends of public opinion, especially trends that individuals and the behaviors of people, institutions or ideas are determined by forming images that they hold in their minds towards these persons or institutions. Modern enterprises have realized, whether they are governmental ministries and official departments or non-governmental organizations as civil society organizations, the importance of studying the dominant image in the minds of the masses and make decisions and draw plans to configure this image as these institutions wishes.&n
... Show MoreThe theater benefited from the concept of (hypertext) to create different virtual worlds. The four chapters of the research included the first (methodological framework), the second (theoretical framework) came in two sections (hypertext, its concepts and applications) and (hypertextual space in theatrical performance), and the investigations resulted in indicators, including:
1- Hypertext is interacting interactively, but it is organized by correlation as a basic feature that defines it with different manifestations.
2- The hypertext combines the word with other formative elements that reduce a set of tagged information (word, image, light, shadow, color, number).
In the third chapter (research procedures) (Lord play) was
A total of 70 pregnant women with toxoplasmosis were studied to evaluate of some immunological aspects. The women were distributed into three groups: 37 women were IgG positive, 18 women were IgM positive and 15 women were IgG and IgM positive as well as 25 healthy women were considered as control group. Serum samples were collected and ELISA method was employed to assess levels of interleukins 4, 6, 10, Interferon gamma-induced protein 10 (IP-10), Granulocyte-macrophage colony-stimulating factor (GM-CSF) and Vascular endothelial growth factor (VEGF). As compared with control the levels of cytokines were significantly increased in serum of three pregnant women groups with toxoplasmosis and the highest increase was observed in the IgM positi
... Show More