Blood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant women when compared with healthy non pregnant women. Lymphocyte activity of infants infected with CMV was also significally lower when comparison with non infected infants.
In this research, a type of gram negative bacteria was exposed to non-thermal plasma at a distance of (2 and 3 cm) from the plasma flow nozzle, with the use of an alternating power supply (5KHz), where exposure was made at two different voltages (4.9 and 8 kV). A negative gram of Pseudomonas aeruginosa bacteria was isolated and exposed to non-thermal plasma at different flow rates of argon gas whose value ranged from (1-5) liters/minute. The results showed that bacterial killing rate is directly proportional to distance while exposing the samples to non-thermal plasma, and the best factors by which a complete killing rate was obtained were at a distance of 2 cm with a voltage of 8 kV and a gas flow rate of 5 liters/min,
... Show MoreCloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optim
... Show MoreIn study carried out in the cold storage in college of Agric./Univ. of Baghdad at 8 ? C. shows that Alternaria , Pencillium , Rhizoctonia , Mucor , are the fungi that causes tomato fruits decay. This is the first record of Rhizoctonia and Mucor as a Tomato fruits rot under 8º c in Iraq. There is no fungal infection on cucumber fruits under 8 ? C. . Waxing tomato fruits reduced the severity of the fungi infection and gave shelflife (19 days) under 8 ? C. There is an infection with Mucor was found in tomato fruits kept in perforated polyethylene bages with 16 bores prevent the infection and the lowest severity and frequency of infection was found in waxed tomato fruits. Part of M.Sc thesis of the Second author.
A new copolymer (MFA) was prepared from condensation of melamine (M) with p- methyl – anisole (A) in the presence of condensation agent like 37% (w/v) of formaldehyde. The new copolymer was characterized by elemental, IR and HNMR spectra. The chelating ion-exchange property of this polymer was studied for methylene blue dye in aqueous solution in 100-200ppm concentrations. The adsorption study was carried out over a wide range of pH, shaking time and in media of various kinetic parameters models. Thermal parameters like enthalpy, entropy and Gibbs free energy of adsorption process of methylene blue on surface of MFA resin were determined on the basis of kinetic parameters at different temperatures. To describe the equilibrium of adsorp
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More