Preferred Language
Articles
/
bsj-4189
Detection of Aflatoxin B1 among Early and Middle Childhood Iraqi Patients
...Show More Authors

      The study was conducted for the detection of Aflatoxin B1(AFB1) in the serum and urine of 42 early and middle childhood patients (26 male and  16 female ) with renal function disease, liver function disease, in additional to atrophy in the growth and other symptoms depending on the information within consent obtained from each patient, in addition to 8 children, apparently healthy, as  the control. The technique of HPLC was used for the detection of AFB1 from all samples. The results showed that out of 42 patient children, 19 (45.2%) gave positive detection of AFB1 in the serum among all age groups patients with a mean of 0.88 ng/ml and a range of (0.12-3.04) ng/ml. This was compared with the control that did not detect any level. On the other hand, AFB1 was not detected in any of urine samples in both of the sexes. Positive results of serum AFB1 were recorded in males more than females sample which reached 12(46.1%) and 7(43.7%) respectively with a mean/ range reached to (1.08 /0.12-2.91 and 0.82/0.12-1.30)ng/ml respectively, compared with 8 control samples that did not detect any value of aflatoxins.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Feb 10 2009
Journal Name
مجلة كلية اللغات
relative pronoun in Hebrew language between ancient and modern
...Show More Authors

Abstract The relative pronoun in Hebrew language is an important pronoun use anciently and recently, it developed and it's usage and meanings differed so, it was not confined to the particle "אֲשֶׁר" as a relative pronoun, but beside it appeared other pronouns giving the relative meaning. Hence, the topic of this research was on this basis through studying the relative pronouns in old and modern Hebrew, the way of using them and their connection with preposition particles, as well as studying the relative clause.

Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of financial investments using financial indicators Applied in the Middle East Bank of Iraq for investment For the fiscal period 2007-2009
...Show More Authors

The research explain the analysis of finance investments through  analyze the finance tables for commercial banks, by using the pointers to indicate the limits of economical benefit for these investments, and fix the negative deviations and as well positive, for the purpose of  diagnostic the negative (disadvantage) and develop the advantage deviation, For the importance of finance investments in the development operation and economical growth, further to that the finance investments is represent one of the most activities in the commercial banks in which aim the adequate incomes as a result of the commercial banks act to receipt the banks deposits and then make it growth and develop through  commercial advantage o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Gas Lift for Improved Oil Recovery in a Middle East Field: A Genetic Algorithm Approach
...Show More Authors

This paper presents a study of the application of gas lift (GL) to improve oil production in a Middle East field. The field has been experiencing a rapid decline in production due to a drop in reservoir pressure. GL is a widely used artificial lift technique that can be used to increase oil production by reducing the hydrostatic pressure in the wellbore. The study used a full field model to simulate the effects of GL on production. The model was run under different production scenarios, including different water cut and reservoir pressure values. The results showed that GL can significantly increase oil production under all scenarios. The study also found that most wells in the field will soon be closed due to high water cuts. Howev

... Show More
View Publication
Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
A Cognitive Linguistic Study of the Satirical Language in Al-Hajjar's Caricatures
...Show More Authors

The present study is a qualitative study that aims to investigate the way the Iraqi caricaturist,Dheaa Al-Hajjar uses caricatures to produce a satirical meaning humorously.Producing satire while at the same maintaining humor requires a creative thinking on the part of the caricaturist. Thus, the study examines the production of humorous satire in terms of creativity. The analysis is done from the cognitive linguistic point of view using Arthur Koestler's theory of bisociation as presented in his book The Act of Creation in 1964. The main principle on which the theory is based is that humor is created via linking (or bisociating in Koestler's terms) two habitually incompatible trains of thought in order to come up with a novel me

... Show More
View Publication Preview PDF