Preferred Language
Articles
/
bsj-2435
Detection of Chlamydia pneumoniae in Ankylosing Spondylitis Patients
...Show More Authors

Ankylosing spondylitis is a complex debilitating disease because its pathogenesis is not clear. This study aims at detecting some pathogenesis factors that lead to induce the disease. Chlamydia pneumoniae is one of these pathogenesis factors which acts as a triggering factor for the disease. The study groups included forty Iraqi Ankylosing spondylitis patients and forty healthy persons as a control group. Immunological and molecular examinations were done to detect Chlamydia. pneumoniae in AS group. The immunological results were performed by Enzyme-Linked Immunosorbent Assay (ELISA) to detect anti-IgG and anti-IgM antibodies of C. pneumoniae revealed that five of forty AS patients' samples (12.5%) were positive for anti-IgG and IgM C. pneumoniae antibodies compared to controls which revealed seronegative. Molecular detection included 16srRNA and HSP-70 genes were to ensure the serological examination for detection of bacteria in the five blood samples which were positive; therefore, these results improved that C. pneumoniae played a role in the pathogenesis of the disease

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
The Determination of Lower Limit Detection of X-Ray Fluorescence for Zinc Powder Suspended in Engine Oil
...Show More Authors

In this work Different weight of pure Zinc powder suspended particles in 4ml base engine Oil were used.
Intensity of Kα Line was measured for the suspended particles ,also for mixture which consist from Zinc particle blended with Engine base Oil. Calibration Curve was drawn between Ikα line Intensity and Zinc concentration at different operation condition. The Lower Limit detection (LLD) and Sensitivity (m) of Spectrometer were determined for different Zinc Concentration (Wt%). The results of LLD and m for Samples were analyzed at Operation Condition of 30KV,17mA is best from Samples were analyzed at Operation Condition of 25KV,15mA

View Publication Preview PDF
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Concept And Importance Of Detection Failureś Possibilities Of Corporation Proposed Model For Application In The Iraqi Environment
...Show More Authors

Research aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting  a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a  number of academics professionals experts, in addition to  financial analysts  and have concluded a set of conclusions ,  the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2014
Journal Name
World Journal Of Pharmaceutical Sciences
Detection of JAK2V617F Mutation and Serum Levels of Alkaline Phosphatase and Lactate Dehydrogenase in Chronic Myelogenous Leukemia.
...Show More Authors

Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a

... Show More
Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Rawaa Emad Jaloud And Fadia Falahfadia Falah
Isolation and Identification of Fungal Propagation in Iraqi Meat and Detection of Aflatoxin B1 Using ELISA Technique
...Show More Authors

Scopus (5)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
Kuwait Journal Of Science
Detection of the most frequent sources of dust storms in Iraq during 2020–2023 using space tools
...Show More Authors

Dust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS so

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Detection of early occlusal caries of the first permanent molar using different techniques (An in vivo study)
...Show More Authors

Background: Molars and premolars are considered as the most vulnerable teeth of caries attack, which is related to the morphology of their occlusal surfaces along with the difficulty of plaque removal. different methods were used for early caries detection that provide sensitive, accurate preoperative diagnosis of caries depths to establish adequate preventive measures and avoid premature tooth treatment by restoration. The aim of the present study was to evaluate the clinical sensitivity and specificity rates of DIAGNOdent and visual inspection as opposed to the ICDAS for the detection of initial occlusal caries in noncavitated first permanent molars. Materials and Methods: This study examined 139 occlusal surface of the first permanent

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
Autonomic Dysfunction in Interictal Period in Patients with Migraine
...Show More Authors

Background: migraine is a chronic neurovascular disorder characterized by intermittent attacks of sever headache with or without aura that can include various combinations of neurological, gastrointestinal tract (G.I.T), and autonomic changes, without evidence of primary structural abnormalities. The Autonomic nervous system involvement suggested by many symptoms and signs including nausea, diarrhea, constipation, coldness in the extremities, paroxysmal tachycardia and chest pain.
Objectives: To evaluate autonomic functions in patients with migraine and to clarify the autonomic dysfunction weather its sympathetic, parasympathetic, or combined. Also to assess the severity of this dysfunction and its relation to age, gender and type of

... Show More
View Publication Preview PDF
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

View Publication
Scopus (60)
Crossref (60)
Scopus Clarivate Crossref