Preferred Language
Articles
/
bsj-4514
Detection of Leishmania tropica Using Nested-PCR and Some of Their Virulence Factors in Thi-Qar Province, Iraq
...Show More Authors

Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was used to amplify kinetoplast minicircle fragments DNA (kDNA). Conventional-PCR was performed for determination of some virulence factors (LPG1, GP63, CPA and PPG1 genes). The electrophoresis findings of kDNA gene showed two species of the parasite found in the study area, 65 samples were positive for cutaneous leishmaniasis, L. tropica at 750bp and L. major at 560bp. Generally, L. tropica (57.5%) was the most common specie and L. major (23.75%) appeared in a low level. There are no significant differences between the infections of males and females, while there are significant differences at the comparison between age groups. All virulence genes (LPG1, GP63, CPA and PPG1) appeared in all L. tropica isolates with high percentage (100%). L. tropica is the major specie which that caused CL in Thi-Qar province, while L. major appeared in low incidence. The virulence genes, which were reviewed, are necessary and important in pathogenesis of L. tropica.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
مجلة علوم الرياضة
تأثير تمرينات على وفق العتبة اللاهوائية لتطوير القوة المميزة بالسرعة للذراعين والرجلين وبعض المهارات الدفاعية للشباب بكرة السلة
...Show More Authors

لعبة كرة السلة واحدة من الألعاب الجماعية التي تتميز بقوة وسرعة الأداء في المباريات، وهذا لم يأتي مصادفة وإنما جاء نتيجة لتطور العملية التدريبية من جانب ومن جانب آخر امتلاك اللاعبين لقدرات بدنية لها فاعليتها من الأداء ومنها القوة المميزة بالسرعة، إما أهمية البحث فتكمن في السعي إلى تطوير هذه القدرة ومعرفة تأثيرها في الأداء المهاري لتكون عوناً للمدربين في العملية التدريبية. أما مشكلة البحث فيمكن أن توضع في تس

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 14 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Correlation between Streptococci Mutans and salivary IgA in relation to some oral parameters in saliva of children
...Show More Authors

Background: Saliva plays an important role in oral health. Several salivary proteins are involved in the antimicrobial defence mechanism and are able to eliminate or inhibit bacterial growth in the oral cavity. Secretory IgA (SIgA) is one of the principal antibodies present in saliva, could help oral immunity by preventing microbial adherence, neutralizing enzymes and toxins. The aim of this study was to investigate the relationship between salivary Streptococcus Mutans (SM) count and S IgA in stimulated whole saliva in children with primary dentition compared to those with permanent teeth in relation to some oral hygiene parameters. Material and methods: Stimulated whole saliva was collected from 50 children (25 with primary dentation and

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (39)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
The Immunohistochemically Estimation of CD63 in Iraqi Patients with Gastric Cancer
...Show More Authors

CD63 is -one of the tetraspanin family proteins, which are regarded as: hallmark exosomal markers because it is absent from other types of vesicles. It is expressed in the cell membrane of cancer cells, and cytoplasm of stromal cells. Objective: To assess CD63 expression in gastric cancer (GC) patients, and detected if it could be used as a predictive marker. Furthermore, the current study aimed to find the correlation between CD63 expression and clinicopathological parameters as: gender, age, invasion depth, histopathological type, involvement of lymph nodes, grade and stages of GC (TNM). The current study is a retrospective study in the period time from (2018 to-2020); 50 randomly patients formalin-fixed paraffin embedded blocks (FFPE)

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
A comparative study in disruptive behavior at the Deprived and non-Deprived students from their parents at the Secondary stage
...Show More Authors

The current research aims to :
•know the level of the chaotic behavior of the sample as a whole .
•Know the differences with statistical significance in disorderly behavior between the
disadvantaged and non-disadvantaged peers .
To achieve these objectives, the selected sample of Talbhalmrahlh medium and specifically
students of the second grade average, were chosen randomly stratified's (360) students
included sex (male, female) and (deprived of the Father and the non-deprived) for the
academic year (2013-2014) to the province Baghdad on both sides (Rusafa-Karkh (
As applied to them measurements of disorderly behavior, which is prepared by the researcher,
having achieved _khasaúsma of psychometric (valid

... Show More
View Publication Preview PDF