Preferred Language
Articles
/
bsj-2168
Identification of Candida species Isolated From Vulvovaginal Candidiasis Patients by Chromgen agar and PCR-RFLP Method
...Show More Authors

This study focuses on diagnosis of Candida species causing Vulvovaginal Candidiasis using phenotype and genotype analyzing methods, and frequencies of candida species also using Vulvovaginal Candidiasis patients. 130 samples (100 from patients and 30 from non infected women) were collected and cultured on biological media. Identifying the yeasts, initially some phenotypic experiments were carried out such as germ tube, from motion of pseudohyphae and clamydospores in CMA+TW80 medium, API20 candida and CHROMagar Candida. Genomic DNA of all species were extracted and analyzed with PCR and subsequent Polymerase Chain Reaction - Restriction Fragments Length Polymorphism (PCR-RFLP) methods. Frequency of C. albicans, C. krusei, C. tropicalis , C. parapsilosis and C. glabrata were 46.4%, 31%, 18%, 7.2%, and 1.8%, respectively.The ITS1-ITS4 region was amplified and the Restriction enzyme Msp1 digests this region and was used to identify of candida species .Electrophoretically ribosomal DNA of C. albicans, C. krusei, C. tropicalis and C. glabrata produced two bands whereas the C. parapsilosis gave one band.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Compare Prediction by Autoregressive Integrated Moving Average Model from first order with Exponential Weighted Moving Average
...Show More Authors

The prediction process of time series for some time-related phenomena, in particular, the autoregressive integrated moving average(ARIMA) models is one of the important topics in the theory of time series analysis in the applied statistics. Perhaps its importance lies in the basic stages in analyzing of the structure or modeling and the conditions that must be provided in the stochastic process. This paper deals with two methods of predicting the first was a special case of autoregressive integrated moving average which is ARIMA (0,1,1) if the value of the parameter equal to zero, then it is called Random Walk model, the second was the exponential weighted moving average (EWMA). It was implemented in the data of the monthly traff

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 15 2022
Journal Name
Al-kindy College Medical Journal
Impact of Tobacco Use in the Etiology of Chronic Renal Failure Among Sudanese Patients: Tobacco and Renal Failure Among Sudanese Patients
...Show More Authors

Background: Chronic renal failure (CRF) is a clinical syndrome that occurs when there is gradual decline in renal operation overtime.

Objective: This study aims to investigate the prevalence of depression among medical students at university of Baghdad, college of medicine in Iraq and the association between some variables and depression.

Aim: This study aimed to identify the impact of tobacco use in the etiology of chronic renal failure among Sudanese patients in Omdurman Military Hospital and Omdurman Kidney Dialysis Center

Materials and methods: This descriptive community-based study was conducted in Khartoum State. A random sample of 100 cases with chronic renal failure and 100

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
An Efficient Method for Heat Recovery Process and燭emperature燨ptimization
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Mon Feb 05 2052
Journal Name
Partial Differential Equations In Applied Mathematics
A hybrid analytical method for fractional order Klein–Gordon and Burgers equations
...Show More Authors

Scopus (1)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials & Continua
A New Hybrid Feature Selection Method Using T-test and Fitness Function
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More