This study focuses on diagnosis of Candida species causing Vulvovaginal Candidiasis using phenotype and genotype analyzing methods, and frequencies of candida species also using Vulvovaginal Candidiasis patients. 130 samples (100 from patients and 30 from non infected women) were collected and cultured on biological media. Identifying the yeasts, initially some phenotypic experiments were carried out such as germ tube, from motion of pseudohyphae and clamydospores in CMA+TW80 medium, API20 candida and CHROMagar Candida. Genomic DNA of all species were extracted and analyzed with PCR and subsequent Polymerase Chain Reaction - Restriction Fragments Length Polymorphism (PCR-RFLP) methods. Frequency of C. albicans, C. krusei, C. tropicalis , C. parapsilosis and C. glabrata were 46.4%, 31%, 18%, 7.2%, and 1.8%, respectively.The ITS1-ITS4 region was amplified and the Restriction enzyme Msp1 digests this region and was used to identify of candida species .Electrophoretically ribosomal DNA of C. albicans, C. krusei, C. tropicalis and C. glabrata produced two bands whereas the C. parapsilosis gave one band.
Removal of heavy metals from waste water has received a great deal of attention. The compare Cr
(VI) adsorption characteristics removing from wastewater by using thermally modified and non-modified
eggshells were examined
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe current world seeks to supply the most of the fruits of human knowledge and tries hard to search for the most important scientific facts, programs, means and advanced devices in various fields, including the sports field, and among these means is the use of various and advanced training devices and programs for the purpose of achieving the desired goal, which is to reach the desired level, the basketball game is one of the sports that need high technology in training according to scientifically studied principles because it is one of the games that relate to the abundance of its variables, composition and speed of change, all of which require a technical and high training depth and the players ’possession of different physical charact
... Show MoreBackground/objectives: To study the motion equation under all perturbations effect for Low Earth Orbit (LEO) satellite. Predicting a satellite’s orbit is an important part of mission exploration. Methodology: Using 4th order Runge–Kutta’s method this equation was integrated numerically. In this study, the accurate perturbed value of orbital elements was calculated by using sub-steps number m during one revolution, also different step numbers nnn during 400 revolutions. The predication algorithm was applied and orbital elements changing were analyzed. The satellite in LEO influences by drag more than other perturbations regardless nnn through semi-major axis and eccentricity reducing. Findings and novelty/improvement: The results demo
... Show MoreA total of (90) blood samples were collected from male patients infected with Toxoplasmosis who recovered from COVID- 19 and attended Kamal Alsamiraai Hospital from 15 January to 15 September 2021. We measured anti-Toxoplasma antibodies (IgG and IgM) detected by ELISA, whereas Anti-COVID-19 antibodies (IgG and IgM) were estimated using Elisa and Afilias. The semen characteristics were also studied among fertile, healthy individuals (control group) and sub-fertile patients. Results showed that the mean sperm count was high among the control group (40.5±1.3x 106/ml) compared with that of the sub-fertile patients (10.3±1.75 and 8.8±1.9 x 106/ml for oligozoospermia, and oligoasthenozoospermia respectively), and it was the highest (44.7±1.4
... Show MoreABSTRACT
The study aims to identify the level of health services provided in private suites to government hospitals from the perspective of the recipi
... Show MoreIn this study, the Halder-Wagner method was used for an analysisX-ray lines of Tio2 nanoparticles. Where the software was used to calculate the FWHM and integral breath (β) to calculate the area under the curve for each of the lines of diffraction. After that, the general equation of the halder- Wagner method is applied to calculate the volume (D), strain (ε), stress (σ), and energy per unit(u). Volume (β). Where the value of the crystal volume was equal to (0.16149870 nm) and the strain was equal to (1.044126), stress (181.678 N / m2), and energy per unit volume (94.8474 J m-3).The results obtained from these methods were then compared with those obtained from each of the new paradigm of the HalderWagner method, the Shearer developm
... Show MoreA three species food web model involving a stage structure and cannibalism in the top predator species is proposed and studied. It is assumed that the prey species growth logistically in the absence of predator and the predation process occurred according to theLotka-Volterra functional response. The existence, uniqueness and bounded-ness of the solution of the model are investigated. The local and global stability conditions of all possible equilibrium points are established.The persistence conditions of the model are also determined. The local bifurcation near each of the equilibrium points is analyzed. The global dynamics of the model is investigated numerically and compared with the obtained analytical results. It is observed that the p
... Show More