Preferred Language
Articles
/
bsj-1130
Isolation and Identification of Vibrio cholerae causes Epidemic cholera 2007 in Iraq by Rapid Method (Immunochromatographic one step rapid visual test) and comparing it with the traditional Bacterlogical Methods
...Show More Authors

This study was for searching for Cholera Bacteria serotype which causes epidemiology Cholera in the 2007 in a fast method which contains (Rapid Visual Test) (Crystal V.C.) which was used for the first time in Iraq to diagnosis of Cholera Bacteria & compared with the traditional bacteriology method. The Cholera disease is one of the most dangerous epidemiological diseases which lead to death with a percentage of (50 – 70) % in the severe cases for untreated patients . For this purpose, 100 samples of stool from the patients from a (13) hospitals in Baghdad Governorate in the period from August to the end of December. The Cholera was diagnosis in two methods, 1st method was the fast method using the nitrocellulose which is coated with anti-body of Cholera Bacteria .The results was compared with the 2nd method which depends on the cultural characteristics of the cultural media, also the bacteria was diagnosis using the biochemical inspects by the system of API 20E in addition to the using of antisera to specify serotype& sub-serotype ( Monovalent, Polyvalent(O1) . Also, the relation between the disease & the months in the year in which the disease appear was studied. The results show the ability to isolate & identifecate (78) isolate for the serotype (01) in the fast method ( Rapid Visual Test ) ( Crystal V-C ) , & after the bacteriology inspects on these (78) isolate the all isolates were belongs for Cholera Bacteria of the serotype (01) till the sub-serotype , all the (78) isolates were belongs to the sub-serotype (Inaba). The results show, the most infection was in September (36) , & October (22).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2023
Journal Name
International Journal Of Professional Business Review
Is It Possible To Adopt A Budget Of Performance In The Iraqi Government Companies?
...Show More Authors

Purpose: The study aims to investigate the extent to which material and non-material requirements are available in applying budgeting programs and performance in Iraqi governmental companies that are not aimed at achieving profits. whose activities are limited to providing services of public interest. This is done by studying the extent to which the requirements of each stage of preparing the programs and performance budget can be met.   Theoretical framework: The process of evaluating financial performance is the main objective of all economic units, whether they are governmental or private economic units. Budgets contribute to the evaluation process by analyzing deviations in the application. The study includes an analytical pres

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Review Of Computer Engineering Research
Investigating Factors Affecting the Adoption of Smartphone Technology by Elderly People In Iraq
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of transforming growth factor beta one (TGF-?1) immunohistochemical (IHC) expression profile in the gingival tissue of patients with different forms of periodontal diseases
...Show More Authors

Background: This study evaluate the immunohistochemical expression profile of transforming growth factor beta-1 in inflamed gingival tissue of patients with gingivitis and chronic periodontitis compared to healthy subjects and, determine the correlation between this cytokine and the clinical periodontal parameters, intensity of inflammation and chronic periodontitis severity. Materials and methods: Gingival tissue specimens were taken from 23 chronic periodontitis patients, 20 gingivitis patients and 20 periodontally healthy subjects. The periodontal status was evaluated by dichotomous measurements of the clinical periodontal parameters (PLI, GI, BOP, PPD, CAL). The gingival specimens were fixed immediately in 10% formalin and processed ro

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Gazi University Journal Of Science
Reliable Iterative Methods for Solving Convective Straight and Radial Fins with Temperature-Dependent Thermal Conductivity Problems
...Show More Authors

In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Branch and Bound Algorithm with Penalty Function Method for solving Non-linear Bi-level programming with application
...Show More Authors

The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.

View Publication
Crossref
Publication Date
Sun Aug 28 2016
Journal Name
World Journal Of Pharmacy And Pharmaceutical Sciences
AN INSIGHT ON THE IDENTIFICATION OF CANCER STEM CELLS USING NOVEL IMMUNOLOGICAL AND MOLECULAR STRATEGIES
...Show More Authors

Cancer stem cells (CSCs) are defined as a population of cells present in tumours, which can undergo self-renewal and differentiation. Identification and isolation of these CSCs using putative surface markers have been a priority of research in cancer. With this background we selected pancreatic normal and tumor cells for this study and passaged them into animal tissue culture medium. Further staining was done using alkaline phosphatase and heamatoxilin staining. Blue to purple colored zones in undifferentiated pluripotent stem cells and clear coloration in the chromatin material indicated pancreatic cells. Further studies on the cell surface marker CD 44 were done using ELISA. For this, the protein was extracted from cultivated normal and t

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Simulation of one Dimensional Photoacoustic Imaging
...Show More Authors

The present work provides theoretical investigation of laser photoacoustic one dimensional imaging to detect a blood vessel or tumor embedded within normal tissue. The key task in photoacoustic imaging is to have acoustic signal that help to determine the size and location of the target object inside normal tissue. The analytical simulation used a spherical wave model representing target object (blood vessel or tumor) inside normal tissue. A computer program in MATLAB environment has been written to realize this simulation. This model generates time resolved acoustic wave signal that include both expansion and contraction parts of the wave. The photoacoustic signal from the target object is simulated for a range of laser pulse duration 1

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 30 2025
Journal Name
Iraqi Journal Of Agricultural Sciences
OUTBREAK OF TOBAMOVIRUSES AND POTEXVIRUSES ASSOCIATED WITH DISEASE EPIDEMICS IN TOMATO PRODUCTION AREA OF IRAQ
...Show More Authors

This study was initiated to examine the tomato-infecting viruses belonging to the Tobamovirus and Potexvirus genera in Iraq. Field observations and surveys were carried out for three successive cropping seasons (2020/21 to 2022/23) in selected tomato production areas. The purpose was to identify the main viruses associated with tomato epidemics and assess the impact of different tomato cultivars on disease occurrence. A total of 700 tomato leaf samples were collected from seven governorates (Baghdad, Diyala, Babylon, Najaf, Kerbala, Nasiriya, and Basrah) and tested using pathogen-specific immunostrip kits. The survey showed a presence of Tomato brown rugose fruit virus (ToBRFV), Tobacco mosaic virus (TMV), Pepper mild mottle virus (

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref