To investigate the role of IL-6 and IL-8 in the immune-regulatory mechanisms involved in the recurrent spontaneous abortion of the first trimester of pregnancy. Serum level of IL-6 and IL-8 were determined in 25 women of age (20-35) years who had a spontaneous abortion of unknown aetiology during the first trimester of pregnancy .They were compared with the corresponding levels of 20 pregnant and non-pregnant women as control groups .cytokine levels were measured by (ELISA) technique .The women with spontaneous abortion had highly significant (P < 0.01) increased serum level of IL-8 and highly significant (P < 0.01 ) decreased level of IL-6 compared to those with normal pregnant and non-pregnant women. The results of this study may be related to the underlying aetiopathogenetic mechanisms , however , There is sufficient evidence for their use as predictive markers of pregnancy outcome.
Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreThe research includes the synthesis and identification of the mixed ligands complexes of M 2 Ions in general composition ,[M(Leu) 2 (SMX)] Where L leucine (C 6 H 13 NO 2 )symbolized (LeuH) as a primary ligand and Sulfamethoxazole C 10 H 11 N 3 O 3 S) symbolized (SMX)) as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in(v/v) ethanol /water as solvent containing NaOH. The reaction required the following [(metal: 2(Na Leu --): (SMX )] molar ratios with M(II) ions, Were M ( Mn ( II),Co (II),Ni(II),Cu( II),Zn (II),Cd(II)and Hg( The UV Vis and magnetic moment data revealed an octahedral geometry around M(II), The conductivity data show a non electrolytic nature of the complexes . The
... Show MoreThe importance of the research lies in preparing exercises using a proposed device to learn the skill of thehuman wheel on a machine rug of ground movements of the artistic gymnastics. As for the research problem:Through the presence of the two researchers as teachers and observers of this sport in the gymnastics hall,they noticed that there is difficulty in the students’ performance of the skill of the round off on the machineof the mat of ground movements, according to the researchers’ opinion, the reason for this is that skillsare taught with the limited availability of assistive devices, as well as the lack of use of these devices inexercises according to biomechanical variables, although they facilitate the learning process
... Show MoreNanoparticles of humic acid and iron oxide were impregnated on the inert sand to produce sorbent for treating groundwater contained of cadmium and copper ions by technology of permeable reactive barrier (PRB). Sewage sludge was the source of the humic acid to prepare the coated sand by humic acid—iron oxide (CSHAIO) sorbent; so, this work is consistent with sustainable development. For 10 mg/L metal concentration, batch tests at speed of 200 rpm signified that the removal efficiencies are greater than 90% at sorbent dosage 0.25 g/ 50 mL, pH 6 and contact time 1 h. The kinetic data was well described by the Pseudo first-order model indicating that physicosorption is the predominant mechanism. The maximum adsorption capacities (qmax) were c
... Show More