A total of 258 voluntary blood donors (males 101; females 157) in the age range of 18-52 yr among males and 18-55 yr among females were examined for Toxoplasma gondii antibodies (IgG), and (IgM) by immunological technique (Enzyme linked Immunosorbant Assay) during the period from March 2009 to April 2010. This study covered a wide range of factors including immunological, age ,sex , place of residence and symptoms that may have a possible relationship with toxoplasmosis. Results presented in this study showed clearly that 38 (14.7%) of individuals participated in this study having IgG Toxoplasma Ab, among those 10 samples (9.9%) were males and 28 samples (17.8%) were females. Moreover, we found the prevalence of IgM seropositivity in the study population to be 5.8% ,as well as, the prevalence of IgM was 1.98 % in males and 8.3% in females. In addition to , the results of current study indicated that the seroprevalence of IgG Toxoplasma antibodies are more than IgM antibodies ,besides , the peak period range of toxoplasma gondii antibodies IgG among males donors was 30 to 39 years, while among female donors, the highest detection of Toxoplasma gondii antibodies IgG was between the ages of 40 to 49. What's more, the peak age range of Toxoplasma gondii antibodies IgM among males and females donors was 19 to 29 years. In conclusion , Our study showed a high prevalence of T. gondii antibodies in healthy voluntary blood donors. It may be appropriate to include screening test (ELISA) for T. gondii also in the pre transfusion blood testing schedule.
Police play an important role in any society. Where they maintain public order by stopping and deterring crime and bringing criminals to justice. In order to achieve these objectives, they have certain means of law (search, arrest, use of force that may be lethal in some cases). However, such means may be misused in a way that harms members of society such as (Exceeding the Scope of a search warrant, violation of privacy of individuals, False Imprisonment, Excessive use of force, Sudden Deaths in custody, Sexual Assault and Harassment, Failure to respond for Domestic violence calls), which raises the civil liability of police officers and their agencies for such damage. Police officers may even abuse their characteristics even outside offic
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition. This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
This study aims at defining the concept of the fragile state, a term that came into existence in 2014, when the states that had internal Problems and external interventions were referred to as the failure states. However, the indicators for their designation and the criteria adopted are 12 indicators that address all aspects of the State’s duties vis-a-vis its citizens. The study examined the reasons that led to the continuation of Iraq within the fragile states, and the selection of the five years within the time limits of the study due to the factors that led to the decline of Iraq and falling back within the most fragile countries. The study dealt with the fragile state challenges to the media reality as a result of the change of it
... Show MoreLeinamycin is a thiol dependent DNA alkylating agent which shows very potent activity against various cancer cell lines. This natural compound forms guanine adducts (N7) in DNA which are converted into a basic sites and simultaneously generates Reactive Oxygen Species (ROS), to produce DNA strand breaks in human cancer cells. In present study, eight different strains isolated from Iraqi soils were taxonomically assigned as Streptomyces.atroolivaceous. Remarkably the strain named as THS-44 was distinguished in productivity in comparison with other strains; the amount of leinamycin was 50.98 mg/l. In this study, we assessed the cytotoxic activity of leinamycin against RD and ANM3 cancer cell line in compare with REF cell line as a normal cont
... Show More