Preferred Language
Articles
/
bsj-4514
Detection of Leishmania tropica Using Nested-PCR and Some of Their Virulence Factors in Thi-Qar Province, Iraq
...Show More Authors

Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was used to amplify kinetoplast minicircle fragments DNA (kDNA). Conventional-PCR was performed for determination of some virulence factors (LPG1, GP63, CPA and PPG1 genes). The electrophoresis findings of kDNA gene showed two species of the parasite found in the study area, 65 samples were positive for cutaneous leishmaniasis, L. tropica at 750bp and L. major at 560bp. Generally, L. tropica (57.5%) was the most common specie and L. major (23.75%) appeared in a low level. There are no significant differences between the infections of males and females, while there are significant differences at the comparison between age groups. All virulence genes (LPG1, GP63, CPA and PPG1) appeared in all L. tropica isolates with high percentage (100%). L. tropica is the major specie which that caused CL in Thi-Qar province, while L. major appeared in low incidence. The virulence genes, which were reviewed, are necessary and important in pathogenesis of L. tropica.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 07 2021
Journal Name
Journal Of Petroleum Exploration And Production Technology
Wellbore instability management using geomechanical modeling and wellbore stability analysis for Zubair shale formation in Southern Iraq
...Show More Authors
Abstract<p>Wellbore instability problems cause nonproductive time, especially during drilling operations in the shale formations. These problems include stuck pipe, caving, lost circulation, and the tight hole, requiring more time to treat and therefore additional costs. The extensive hole collapse problem is considered one of the main challenges experienced when drilling in the Zubair shale formation. In turn, it is caused by nonproductive time and increasing well drilling expenditure. In this study, geomechanical modeling was used to determine a suitable mud weight window to overpass these problems and improve drilling performance for well development. Three failure criteria, including Mohr–Coulomb, modifie</p> ... Show More
View Publication
Scopus (38)
Crossref (38)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Analysis of Palestinian Ministry of Education Test Results in Mathfor Eighth Graders basic Public Schools in Tulkarm
...Show More Authors

هدفت هذه الدراسة إلى تحليل نتائج الاختبار الوطني الموحد الذي تطبقه وزارة التربية والتعليم الفلسطينية في مادة الرياضيات لطلبة الصف الثامن الأساسي في المدارس الحكومية في محافظة طولكرم، وذلك لمعرفة مستوى الطلبة على هذا الاختبار في ضوء متغيرات الجنس والمنطقة التعليمية ونوع المدرسة، ومعرفة علاقة التحصيل على هذا الاختبار بتحصيل الطلبة المدرسي والمعدل العام. ولتحقيق ذلك تم تحليل درجات (3218) طالباً وطالبة؛ وهم ي

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (9)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Qualitative and Quantitative Determination of Dapagliflozin Propanediol Monohydrate and Its Related Substances and Degradation Products Using LC-MS and Preparative Chromatography Methods
...Show More Authors

Dapagliflozin is a novel sodium-glucose cotransporter type 2 inhibitor. This work aims to develop a new
validated sensitive RP-HPLC coupled with a mass detector method for the determination of dapagliflozin, its
alpha isomer, and starting material in the presence of dapagliflozin major degradation products and an internal
standard (empagliflozin). The separation was achieved on BDS Hypersil column (length of 250mm, internal
diameter of 4.6 mm and 5-μm particle size) at a temperature of 35℃. Water and acetonitrile were used as
mobile phase A and B by gradient mode at a flow rate of 1 mL/min. A wavelength of 224nm was selected to
perform detection using a photo diode array detector. The method met the

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Self-Questioning Strategy on the Achievement of the Fourth Grade and Their Reflective Thinking in Physics
...Show More Authors

Abstract

The aim of the research is to identify the effect of using the self-questioning strategy on the achievement of fourth-grade students in science and the development of their reflective thinking in physics in the city of Baghdad. The research sample was divided into two groups: an experimental group of (20) students and a control group of (20) students. The researchers developed two tools: a test of (40) multiple-choice questions. The second tool is a test to measure the reflective thinking skills of fourth-grade students. It consists of (25) multiple-choice questions distributed on skills as follow: reflection and observation, detection of inaccuracies, reaching conclusions, giving clear explanations, an

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Journal Of Production And Industrial Engineering
The Use of Quantitative Techniques and Their Role in The Administrative Decision-Making Process in Organizations
...Show More Authors

Due to the developments taking place in the field of communications, informatics systems and knowledge management in the current century, and the obligations and burdens imposed on the business organization to keep pace with these developments, the traditional methods of administrative decision-making are no longer feasible, as recent trends have emerged in management that focus on the need to rely on quantitative methods such as operations research.. The latter is one of the results of World War II, which appeared for the first time in Britain to manage war operations. The first method used in this field is the linear programming method. The use of operations research has developed greatly in the past years, and the methods of analysis in

... Show More
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Relationship between Fiscal Policy and Human Development Analytical Studay Of Iraq Using The (ARDL)Model
...Show More Authors

Fiscal policy is one of the important economic tools that affect economic development in general and human development in particular through its tools (public revenues, public expenditures, and the general budget).

It was hoped that the effects of fiscal policy during the study period (2004-2007) will positively reflect on human development indicators (health, education, income) by raising these indicators on the ground. After 2003, public revenues in Iraq increased due to increased revenues. However, despite this increase in public budgets, the actual impact on human development and its indicators was not equivalent to this increase in financial revenues. QR The value of the general budget allocations ha

... Show More
View Publication Preview PDF
Crossref (1)
Crossref