Preferred Language
Articles
/
bsj-1056
Comparison between the efficiency of serological tests for Identification of Brucellosis
...Show More Authors

Five serological methods for detection of Brucella were compaired in this study, Four of the methods are commonely used in the detections:- 1-Rose-Bengal: as primary screening test which depends on detecting antibodies in the blood serum. 2-IFAT: which detects IgG and IgM antibodies in the serum. 3-ELISA test: which detects IgG antibodies in the serum. 4-2ME test: which detects IgG antibodies The fifth methods. It was developed by a reasercher in one of the health centers in Baghdad. It was given the name of spot Immune Assay (SIA). Results declares that among (100) samples of patients blood, 76, 49, 49, 37, and 28. samples were positive to Rose Bengal, ELISA, SIA, 2ME and IFAT tests, respectively. When efficiency, sensitivity and specificity of the serological methods were compaired, the Following results were obtained: a) ELISA and SIA were superiors among the other confirming methods (2ME and IFAT) in detecting the highest cases (49 cases); 46 of them were from the (76) cases positive to Rose Bengal The confirmatory test 2ME was not efficient in detecting low concentrations of IgG antibodies when less than half (37) of the total positive cases (76) were detected by this test. b) IFAT test was the least efficient confirmatory test among all other test. c) As a new confirmatory test, SIA proved to be an efficient and serological test for Brucella detection in comparison with other tests. It is an easy to use test, rapid and could be performed without need to the expensive equipment .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Ieee Transactions On Circuits And Systems Ii: Express Briefs
Adaptive Multibit Crosstalk-Aware Error Control Coding Scheme for On-Chip Communication
...Show More Authors

The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie

... Show More
View Publication
Scopus (11)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 09 2022
Journal Name
Revista Mexicana De OftalmologĂ­a (english Edition)
Posterior subtenon triamcinolone acetonide combined with phacoemulsification for patients with diabetic maculopathy
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 28 2025
Journal Name
Iraqi Geological Journal
Assessing Acid Fracturing for Low-Permeability Carbonate Formation to Improve Oil Production
...Show More Authors

This study investigates the application of hydraulic acid fracturing to enhance oil production in the Mishrif Formation of the Al-Fakkah oilfield due to declining flow rates and wellhead pressures resulting from asphaltene deposition and inadequate permeability. Implementing acid fracturing, an established technique for low-permeability carbonate reserves, was essential due to the inadequacy of prior solvent cleaning and acidizing efforts. The document outlines the protocols established prior to and following the treatment, emphasizing the importance of careful oversight to guarantee safety and efficacy. In the MiniFrac treatment, 150 barrels of #30 cross-linked gel were injected at 25 barrels per minute, followed by an overflush wi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
The Sai 2015
An optimal defuzzification method for interval type-2 fuzzy logic control scheme
...Show More Authors

Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using jack knife to estimation logistic regression model for Breast cancer disease
...Show More Authors

 

It is considered as one of the statistical methods used to describe and estimate the relationship between randomness (Y) and explanatory variables (X). The second is the homogeneity of the variance, in which the dependent variable is a binary response takes two values  (One when a specific event occurred and zero when that event did not happen) such as (injured and uninjured, married and unmarried) and that a large number of explanatory variables led to the emergence of the problem of linear multiplicity that makes the estimates inaccurate, and the method of greatest possibility and the method of declination of the letter was used in estimating A double-response logistic regression model by adopting the Jackna

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Chaos, Solitons & Fractals
A semi-analytical iterative method for solving nonlinear thin film flow problems
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Myoelectric feature extraction using temporal-spatial descriptors for multifunction prosthetic hand control
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref