197 vaginal swabs were collected from women of different ages. (60) Isolates of Candida albicans (30.4%) were obtained, and the other species of Candida represent (18.27%). Bacterial infections showed (41.11%), and infection with Trichomonas vaginalis was (2.03%). Ten isolates of C. albicans were chosen randomly for farther study which include two virulence factors tendency of adhesion wich showed a percentage of (52%) to(32%) , and the ability to produce phospholipaze enzyme and it’s activity which showed (50%) of the isolates have the ability to produce the enzyme in different degrees .
The current Iraqi standard specifications for roads and bridges allowed the prepared Job-Mix Formula for asphalt mixtures to witness some tolerances with regard to the following: coarse aggregate gradation by ± 6.0 %, fine aggregate gradation by ± 4.0 %, filler gradation by ± 2.0 %, asphalt cement content by ± 0.3 % and mixing temperature by ± 15 oC. The objective of this work is to evaluate the behavior of asphalt mixtures prepared by different aggregates gradations (12.5 mm nominal maximum size) that fabricated by several asphalt contents (40-50 grade) and various mixing temperature. All the tolerances specified in the specifications are taken into account, furthermore, the zones beyond these tolerances
... Show MoreFour simply supported reinforced concrete (RC) beams were test experimentaly and analyzed using the extended finite element method (XFEM). This method is used to treat the discontinuities resulting from the fracture process and crack propagation in that occur in concrete. The Meso-Scale Approach (MSA) used to model concrete as a heterogenous material consists of a three-phasic material (coarse aggregate, mortar, and air voids in the cement paste). The coarse aggregate that was used in the casting of these beams rounded and crashed aggregate shape with maximum size of 20 mm. The compressive strength used in these beams is equal to 17 MPa and 34 MPa, respectively. These RC beams are designed to fail due to flexure when subjected to lo
... Show MorePapillary thyroid carcinoma (PTC) represents the most prevalent kind of thyroid gland cancer, making up around 80% of all occurrences of thyroid cancer. Evidence shows that Syndecan-1 (SDC-1) expression is lost in a number of benign and malignant epithelial neoplasms, although its expression profile in thyroid gland neoplasms is yet unknown. Therefore, the aim of this study was to assess SDC-1 expression in papillary thyroid carcinoma patients, as well as the relationship between age and gender and SDC-1 expression. To undertake a detailed investigation of SDC-1 in normal and malignant tissues, tissue sections were used to examine SDC-1 expression in 70 tissue samples, 50 distinct PTC (6 males and 44 females) and 20 normal tissue ty
... Show MoreCommercial fish catch in the Iraqi marine waters from December 2018 to December 2019 was investigated. The study is based on three stations: the first station is located at the Shatt Al-Arab estuary, the second represents the area between the Shatt Al-Arab Estuary and open marine waters, and the third is associated with the Iraqi territorial marine waters. The total weight of the catch was 1881 kg, represented by 500, 654, and 727 kg in the first, second and third stations respectively. The third station was the highest with a majority of the family Sciaenidae by 464 kg, while the lowest was the family Scombridae by 0.5 kg. The total number of species included 37 species, belonging to 27 genera, 19 families, and 6 orders, the largest ord
... Show MoreLymphoma is a cancer arising from B or T lymphocytes that are central immune system components. It is one of the three most common cancers encountered in the canine; lymphoma affects middle-aged to older dogs and usually stems from lymphatic tissues, such as lymph nodes, lymphoid tissue, or spleen. Despite the advance in the management of canine lymphoma, a better understanding of the subtype and tumor aggressiveness is still crucial for improved clinical diagnosis to differentiate malignancy from hyperplastic conditions and to improve decision-making around treating and what treatment type to use. This study aimed to evaluate a potential novel biomarker related to iron metabolism,
... Show MoreThis study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreFlexure members such as reinforced concrete (RC) simply supported beams subjected to two-point loading were analyzed numerically. The Extended Finite Element Method (XFEM) was employed for the treatment the non-smooth h behaviour such as discontinuities and singularities. This method is a powerful technique used for the analysis of the fracture process and crack propagation in concrete. Concrete is a heterogeneous material that consists of coarse aggregate, cement mortar and air voids distributed in the cement paste. Numerical modeling of concrete comprises a two-scale model, using mesoscale and macroscale numerical models. The effectiveness and validity of the Meso-Scale Approach (MSA) in modeling of the reinforced concrete beams w
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreWhenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas
... Show More