Preferred Language
Articles
/
bsj-2743
Detection of RAF fusion transcripts in FFPE samples of Medullablastoma and Ependymom in Iraqi children with RT-RQPCR assays
...Show More Authors

Medulloblastomas and ependymomas are the most common malignant brain tumors in children. However genetic abnormalities associated with their development and prognosis remain unclear. Recently two gene fusions, KIAA1549–BRAF and SRGAP3–RAF1 have been detected in a number of brain tumours. We report here our development and validation of RT-RQPCR assays to detect various isoforms of these two fusion genes in formalin fixed paraffin embedded (FFPE) tissues of medulloblastoma and ependymoma. We examined these fusion genes in 44 paediatric brain tumours, 33 medulloblastomas and 11 ependymomas. We detected both fusion transcripts in 8/33, 5/33 SRGAP3 ex10/RAF1 ex10, and 3/33 KIAA1549 ex16/BRAF ex9, meduloblastomas but none in the 11 ependymomas examined. This investigation provided evidence to the value of RT-RQPCR assays for the detection of these fusion genes in large-scale studies on FFPE tissues. The study also reports the first detection of RAF fusion genes in meduloblstomas.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Effect of Silibinin in Lowering the Intraocular Pressure in Normotensive Rabbits: Interaction with Betaxolol
...Show More Authors

Previous reports demonstrated the effectiveness of silibinin hemisuccinate as a potential intraocular pressure-lowering agent. The exact mechanism by which silibinin exerted this effect has not yet been documented, but might suggested to interfere with aqueous humor formation. The present study was designed to evaluate the comparative efficacy of silibinin as IOP lowering agent to that of betaxolol in normotensive rabbits, and the interaction of silibinin with betaxolol as a way for investigating the possible mechanism of action of silibinin in this respect. The effects of instillation of 0.75% silibinin solution and 0.5% betaxolol eye drops in the eyes of normotensive rabbits were evaluated using indentation tonometry. The results showe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 25 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Prevalence of Potentially Inappropriate Prescribing in Geriatric Patients with Psychiatric Disorders in Iraq
...Show More Authors

Potentially inappropriate prescribing is the prescribing of a medication that may cause more harm than benefit, the elderly population aged 65 years or older is more prone to potentially inappropriate prescribing because of alterations in their physiology, pharmacokinetics, and pharmacodynamics as well as polypharmacy and comorbidities, Beers list is a screening tool that help doctors to detect potentially inappropriate prescribing in geriatric patients and is designed to solve this problem, the aim of this study is to measure the prevalence of potentially inappropriate prescribing among psychiatric patients using the Beers criteria as an assessment tool and find the relationship between duration of hospitalization, comorbidities and pol

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
CAVE DWELLING ANIMALS IN IRAQ PART 2: SYSTEMATIC NOTES ON THE NUTHATCH OF THE FAMILY SITTIDAE (AVESPASSERIFORMES) IN IRAQ WITH ADDING SOME IMPORTANT KNOWLEDGE TO THE NEST BUILDING OF SITTATEPHRONOTA SHARPE, FROM BESAN VALE HAWRAMAN SLOPE, IRAQI KURDISTAN
...Show More Authors

This paper is a review of the genus Sitta in Iraq, Five species of this genus are recognized
Sitta kurdistanica, S. neumayr, S. europaea, S.dresseri and S. tephronota. Geographical
distribution and systematic nots were given for separation and identification, also some notes
on nest building and nest sites of S. tephronota supporting by figures are presented.

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The impact of the proposed strategy in accordance with the objectives of science in achievement and some science operations at the second-grade middle students in chemistry
...Show More Authors

It aim current researchs֬ to identify the impact of a proposed strategy in accordance with the objectives of science in the achievement and some science processes, where the experimental method was adopted, and define the research community was students second grade averag in Education Bagdad / Rusafa third, research sample intentionally chosen as school Radwan, and (30) students experimental group and (29) of control group, research tools were achievement test and the test of science operations and use the appropriate statistical tools to process information and data, showing results, the experimental group surpassed the control group in the collection and operations science, and light it, the researcher recommended several recommendat

... Show More
View Publication Preview PDF