Preferred Language
Articles
/
bsj-4514
Detection of Leishmania tropica Using Nested-PCR and Some of Their Virulence Factors in Thi-Qar Province, Iraq
...Show More Authors

Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was used to amplify kinetoplast minicircle fragments DNA (kDNA). Conventional-PCR was performed for determination of some virulence factors (LPG1, GP63, CPA and PPG1 genes). The electrophoresis findings of kDNA gene showed two species of the parasite found in the study area, 65 samples were positive for cutaneous leishmaniasis, L. tropica at 750bp and L. major at 560bp. Generally, L. tropica (57.5%) was the most common specie and L. major (23.75%) appeared in a low level. There are no significant differences between the infections of males and females, while there are significant differences at the comparison between age groups. All virulence genes (LPG1, GP63, CPA and PPG1) appeared in all L. tropica isolates with high percentage (100%). L. tropica is the major specie which that caused CL in Thi-Qar province, while L. major appeared in low incidence. The virulence genes, which were reviewed, are necessary and important in pathogenesis of L. tropica.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Evaluation of Nuclear safety procedures in some Iraqi universities
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Physics Of Atomic Nuclei
Differences in Ground State Properties of Some Mirror Nuclei
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Some Immunologic Evaluations of Toxoplasmosis in Iraqi Aborted Females
...Show More Authors

Forty-eight aborted women (Iraqi Arab Muslims) at the first trimester with a serological evidence of toxoplasmosis were investigated. Two age- and ethnic-matched control groups were included: 40 aborted women due to accidental events (Control I), and 40 unmarried (virgin) women (Control II). The subjects were evaluated for the following parameters: HLA-class I antigens (A, B and Cw), blood groups, total and differential counts of leukocytes, lymphocyte subpopulations (CD3+, CD4+ and CD20+ cells), phagocytosis of heat-killed yeast (phagocytic index and NBT index), and total serum levels of immunoglobulins (IgA, IgG and IgM) and complement components (C3 and C4). The HLA-A2 and -Cw8 antigens were significantly increased in the patien

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 29 2023
Journal Name
Studia Chemia
THERMODYNAMIC STUDY OF SOME ALCOHOLS IN DILUTE AQUEOUS SOLUTION
...Show More Authors

Scopus
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Major inflammatory patterns of chronic sinonasal diseases and their accompanied anatomical variations; CT scan review
...Show More Authors

Background: Because of wide use of Functional Endoscopic Sinus Surgery (FESS) technique in the recent years and basic role of coronal computed tomography (CT) scan in demonstrating the normal drainage route of para-nasal sinuses, identifying the major patterns of inflammatory sinonasal disease and accompanied anatomical variations is essential for appropriate preoperative surgical planning. In review of publisthed literature, there is no data on CT patterns of chronic inflammatory sinonasal disease and their accompained anatomical variations of nose and PNS in our local population.Objectives: was to determine the frequency of CT patterns and variations in patients with sinonasal symptoms.Methods: This was a cross sectional descriptive st

... Show More
View Publication Preview PDF