The study was conducted for the detection of Aflatoxin B1(AFB1) in the serum and urine of 42 early and middle childhood patients (26 male and 16 female ) with renal function disease, liver function disease, in additional to atrophy in the growth and other symptoms depending on the information within consent obtained from each patient, in addition to 8 children, apparently healthy, as the control. The technique of HPLC was used for the detection of AFB1 from all samples. The results showed that out of 42 patient children, 19 (45.2%) gave positive detection of AFB1 in the serum among all age groups patients with a mean of 0.88 ng/ml and a range of (0.12-3.04) ng/ml. This was compared with the control that did not detect any level. On the other hand, AFB1 was not detected in any of urine samples in both of the sexes. Positive results of serum AFB1 were recorded in males more than females sample which reached 12(46.1%) and 7(43.7%) respectively with a mean/ range reached to (1.08 /0.12-2.91 and 0.82/0.12-1.30)ng/ml respectively, compared with 8 control samples that did not detect any value of aflatoxins.
The consequences of ionizing radiation-induced oxidative stress on radiographers in X-ray and CT-scan departments utilizing several biochemical were analyzed. The study found highly considerable discrepancies in the interplay between radiation levels and gender in terms of mean Malondialdehyde (MAD), Vitamin D3 (Vit.D3), Triiodothyronine (T3), Thyroxine (T4), and High-Density Lipoprotein (HDL), but not Thyroid Stimulating Hormone (TSH), cholesterol, triglyceride (TG) and Low-Density Lipoprotein (LDL). The findings indicated that malondialdehyde is a useful biomarker for assessing oxidative stress in radiographers with exposure to ionizing radiation.
The general budget is usually linked to the role of the state in public life and economic activity, whether this role is neutral or interventionist and thus reflects the general objectives that the state seeks to achieve.
for importance of the public budget in clarifying the image of the political state philosophy and its objectives it seeks to achieve on the one hand and clarifying the degree and rank it occupies in the ladder of development among the other countries. This study is intended to highlight the concepts of the general budget and how its concept has evolved since the Middle Ages. Of the importance of the general budget in Iraq was not based on scientific and objective and then the study
... Show MoreThe study aims to investigate the effectiveness of cognitive-behavioral counseling in reducing symptoms of social anxiety and improving social skills among a sample of intermediate school students in the city of Souq Al-Shuyukh at Dhi Qar Governorate. The sample consisted of (40) female students, their ages ranged (14-15). They were selected based on their high scores on the social anxiety scale. The sample was divided into two groups: an experimental group, and a control group, equal in number (20) students in each group. The researcher used the social anxiety scale and the social skills scale. In addition, he used the cognitive-behavioral counseling program, consisting of (11) counseling sessions, with a rate of (45) minutes per sessio
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreEvolutionary algorithms are better than heuristic algorithms at finding protein complexes in protein-protein interaction networks (PPINs). Many of these algorithms depend on their standard frameworks, which are based on topology. Further, many of these algorithms have been exclusively examined on networks with only reliable interaction data. The main objective of this paper is to extend the design of the canonical and topological-based evolutionary algorithms suggested in the literature to cope with noisy PPINs. The design of the evolutionary algorithm is extended based on the functional domain of the proteins rather than on the topological domain of the PPIN. The gene ontology annotation in each molecular function, biological proce
... Show MoreBy definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.