Preferred Language
Articles
/
bsj-4014
A Prevalence study of Entamoeba spp. in Basrah Province using Different Detection Methods
...Show More Authors

This study aims to determine the prevalence of Entamoeba histolytica, Entamoeba dispar and
Entamoeba moshkovskii by three methods of diagnosis (microscopic examination, cultivation and PCR) that
were compared to obtain an accurate diagnosis of Entamoeba spp. during amoebiasis. Total (n=150) stool
samples related to patients were (n = 100) and healthy controls (n= 50). Clinically diagnosed stool samples
(n=100) were collected from patients attending the consultant clinics of different hospitals in Basrah during
the period from January 2018 to January 2019. The results showed that 60% of collected samples were
positive in a direct microscopic examination. All samples were cultivated on different media; the Brain heart
infusion agar showed high efficiency and was the most suitable in cultivating the parasite. Data and results of
molecular study were indicated by DNA extraction from stool samples and used in PCR technique with
specific primers. This study identifies different infection percentage for the three species. The highest
infection in Basrah patients was Entamoeba moshkovskii 15% followed by Entamoeba dispar 10% and
Entamoeba histolytica, which was 5%.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Arabic Characters Recognition by Edge Detection Using Connected Component Contour(CO3)
...Show More Authors

  In the present paper, Arabic Character Recognition  Edge detection method based on contour and connected components  is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content.         The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Breast Cancer Detection using Decision Tree and K-Nearest Neighbour Classifiers
...Show More Authors

      Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the  most effective parameter, particularly when Age<49.5. Whereas  Ki67  appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu

... Show More
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Qualification Of Human Resources To Apply Electronic Management A case study In The Ministry Of Science And Technology
...Show More Authors

     This research aims to shed light on the reality of the process of rehabilitation of human resources for the implementation of electronic management practice in the ministry, and availability requirements of the application of electronic management and diagnosis of the most important stages and steps that can be followed in the process of transition towards electronic management to keep abreast of developments in the field of information technology, has been the application of this research in the Ministry of science and technology on a group of heads of departments and directors of the people in the departments of the Ministry through the use of case study method, which includes cohabitation field intervi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2023
Journal Name
Journal Of Planner And Development
The dynamics of the oil industry in shaping land uses: a case study of the Zubair oil field
...Show More Authors

The emergence of oil fields and subsequent changes in adjacent land use are known to affect settlements and communities. Everywhere the industry emerges, there is little understanding about the impact of oil fields on land use in the surrounding areas. The oil industry in Iraq is one of the most important industries and is almost the main industry in the Iraqi economic sector, and it is very clear that this industry is spread over large areas, and at the same time adjoins with population communities linked to it developmentally.

The rapid development and expansion of oil extraction activities in various regions has led to many challenges related to land-use planning and management. Here, the problem of research  arises on th

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
The origins of the structure of nominative pronouns, a linguistic study
...Show More Authors

The Arabic pronouns received a lot of attention from the ancient Arab grammarians, so they explained their origins, the different forms of their structure, and the aspects of the Arabs’ use of them, and explained the aspects and reasons for these uses, with what they had of linguistic insight, which guided them to clarify the truth of these pronouns.
And recently, this research seeks new knowledge of the development of the structure of the nominative pronouns (he), (she), (them), (taa), and (waw) between dialects and towards classical Arabic, by analyzing the structure of these pronouns into their components. Its linguistic formulas are traced from the ancient Arabic texts, and by ancient I mean the texts of the era of linguistic ci

... Show More
View Publication Preview PDF