Pseudomonas aeruginosa has variety of virulence factors that contribute to its pathogenicity. Therefore, rapid detection with high accuracy and specificity is very important in the control of this pathogenic bacterium. To evaluate the accuracy and specificity of Polymerase Chain Reaction (PCR) assay, ETA and gyrB genes were targeted to detect pathogenic strains of P. aeruginosa. Seventy swab samples were taken from patients with infected wounds and burns in two hospitals in Erbil and Koya cities in Iraq. The isolates were traditionally identified using phenotypic methods, and DNA was extracted from the positive samples, to apply PCR using the species specific primers targeting ETA, the gene encoding for exotoxin A, and gyrB gene. The results of this study indicate that 100% of P. aeruginosa isolates harbored the gyrB gene, whereas 74% of these isolates harbored ETA gene. However, the specificity of PCR for detection of P. aeruginosa based on the both genes was 100%, since no amplified product obtained using DNA extracted from other bacterial species. Hence by considering the importance of rapid detection of this bacterium due to the presence of problems in biochemical methods, PCR targeting multiple virulence genes is suggested in identification of pathogenic strains of P. aeruginosa isolated from some infections which should speed diagnosis of an antimicrobial therapy.
With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Objective: Rheumatoid arthritis (RA) patients have increased morbidity and mortality from premature cardiovascular (CV) disease (CVD). Framingham risk score (FRS) is a simplified coronary prediction tool developed to enable clinicians to assess the risk of a cardiovascular event and to identify candidate patients for risk factors modifications worldwide. The predictive ability of the FRS varies between populations, ethnic groups, and socio-economic status. The aim of this study is to find if there is any correlation between the Framingham risk score and the inflammatory and biochemical parameters used to measure disease activity and functional ability in Iraqi patients with active RA.
PKE Sharquie MD, PDPAA Noaimi MD, DDV, FDSM Al-Ogaily MD, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
The relationship between the clinical singes and some of the hematological and biochemical values in 126 cases of local breed and Shammi breed goats (from both sexes) diagnosed as cases of malnutrition from 230 goats examined .The clinical examination include (beside the general inspection and case history) body temperature, respiratory and pulse rates, mucus membranes skin and coat. Examination of the blood samples included RBCs count, Hb concentration, PCV % and values of cupper, magnesium, phosphorus, and potassium. The results showed that the mean body temperature of these goats was lower than in normal goats, while the respiratory and pulse rates were higher .Examination of blood revealed decrease in the means of RBCs counts ,Hb con
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreBackground: Implant stability is a mandatory factor for dental implant (DI) osseointegration and long-term success. The aim of this study was to evaluate the effect of implant length, diameter, and recipient jaw on the pre- and post-functional loading stability. Materials and methods: This study included 17 healthy patients with an age range of 24-61 years. Twenty-two DI were inserted into healed extraction sockets to replace missing tooth/ teeth in premolar and molar regions in upper and lower jaws. Implant stability was measured for each implant and was recorded as implant stability quotient (ISQ) immediately (ISQ0), and at 8 (ISQ8) and 12 (ISQ12) weeks postoperatively, as well as post-functional loading (ISQPFL). The pattern of implant
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More