Cutaneous leishmaniasis is one of endemic diseases in Iraq. It is considered as widely health problem and is an uncontrolled disease. The aim of the study is to identify of Leishmania species that cause skin lesions among patients in Thi-Qar Province, South of Iraq, also to detect some virulence factors of L. tropica. This study includes three local locations, Al-Hussein Teaching, Suq Al-Shyokh General and Al-Shatrah General Hospitals in Province for the period from the beginning of December 2018 to the end of September 2019. The samples were collected from 80 patients suffering from cutaneous leishmaniasis, both genders, different ages, various residence places and single and multiple lesions. Nested-PCR technique was used to amplify kinetoplast minicircle fragments DNA (kDNA). Conventional-PCR was performed for determination of some virulence factors (LPG1, GP63, CPA and PPG1 genes). The electrophoresis findings of kDNA gene showed two species of the parasite found in the study area, 65 samples were positive for cutaneous leishmaniasis, L. tropica at 750bp and L. major at 560bp. Generally, L. tropica (57.5%) was the most common specie and L. major (23.75%) appeared in a low level. There are no significant differences between the infections of males and females, while there are significant differences at the comparison between age groups. All virulence genes (LPG1, GP63, CPA and PPG1) appeared in all L. tropica isolates with high percentage (100%). L. tropica is the major specie which that caused CL in Thi-Qar province, while L. major appeared in low incidence. The virulence genes, which were reviewed, are necessary and important in pathogenesis of L. tropica.
لعبة كرة السلة واحدة من الألعاب الجماعية التي تتميز بقوة وسرعة الأداء في المباريات، وهذا لم يأتي مصادفة وإنما جاء نتيجة لتطور العملية التدريبية من جانب ومن جانب آخر امتلاك اللاعبين لقدرات بدنية لها فاعليتها من الأداء ومنها القوة المميزة بالسرعة، إما أهمية البحث فتكمن في السعي إلى تطوير هذه القدرة ومعرفة تأثيرها في الأداء المهاري لتكون عوناً للمدربين في العملية التدريبية. أما مشكلة البحث فيمكن أن توضع في تس
... Show MoreBackground: Saliva plays an important role in oral health. Several salivary proteins are involved in the antimicrobial defence mechanism and are able to eliminate or inhibit bacterial growth in the oral cavity. Secretory IgA (SIgA) is one of the principal antibodies present in saliva, could help oral immunity by preventing microbial adherence, neutralizing enzymes and toxins. The aim of this study was to investigate the relationship between salivary Streptococcus Mutans (SM) count and S IgA in stimulated whole saliva in children with primary dentition compared to those with permanent teeth in relation to some oral hygiene parameters. Material and methods: Stimulated whole saliva was collected from 50 children (25 with primary dentation and
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCD63 is -one of the tetraspanin family proteins, which are regarded as: hallmark exosomal markers because it is absent from other types of vesicles. It is expressed in the cell membrane of cancer cells, and cytoplasm of stromal cells. Objective: To assess CD63 expression in gastric cancer (GC) patients, and detected if it could be used as a predictive marker. Furthermore, the current study aimed to find the correlation between CD63 expression and clinicopathological parameters as: gender, age, invasion depth, histopathological type, involvement of lymph nodes, grade and stages of GC (TNM). The current study is a retrospective study in the period time from (2018 to-2020); 50 randomly patients formalin-fixed paraffin embedded blocks (FFPE)
... Show MoreThe current research aims to :
•know the level of the chaotic behavior of the sample as a whole .
•Know the differences with statistical significance in disorderly behavior between the
disadvantaged and non-disadvantaged peers .
To achieve these objectives, the selected sample of Talbhalmrahlh medium and specifically
students of the second grade average, were chosen randomly stratified's (360) students
included sex (male, female) and (deprived of the Father and the non-deprived) for the
academic year (2013-2014) to the province Baghdad on both sides (Rusafa-Karkh (
As applied to them measurements of disorderly behavior, which is prepared by the researcher,
having achieved _khasaúsma of psychometric (valid