The present study included the microscopic and molecular identification of Entamoeba histolytica by using specific primers to detect four virulence factors possessed by Entamoeba histolytica. Virulence factors included Active Cysteine proteinase, Galactose/N-acetyl-D-galactose-lectin, Amoeba pore C and Phospholipase. Titanium dioxide nanoparticles (TiO2NPs) were synthesized from Pseudomonas aeruginosa which producing Pyocyanin pigment as a reducing agent to form it. After that we studied the ability ofTiO2NPs to inhibit virulence factors production and curing the genes responsible for encoding them by using four different dose 2 ,3, 4, 6 mg/Kg and administered by intraperitoneal injection to laboratory mice Mus musculus. The infection was molecularly confirmed, then the treatment for a period of ten days, as it was given on the third, fifth, seventh, and tenth days. The results of the study showed the inability of dose 2, 3 mg/Kg of TiO2NPs to curing the gene responsible for active cysteine proteinase and Gal/Gal NAC lectin upon treatment on the third to the tenth day, but was able to curing the genes when using dose (4,6) mg/Kg, Statistical analysis was performed , it was found that there were significant differences between the use of different dose and days of treatment. While Amoeba pore C, it was found that the four dose did not affect the inhibition on the third day of treatment. While dose 4,6 mg/Kg were able to curing the gene responsible for its encoding. Statistical analysis showed significant differences between the use of TiO2NPs and the days of treatment. Finally, the results showed that the four doses do not affect on phospholipase. Once, performing the statistical analysis it was found that there were no significant differences.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreThe paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show MoreCadmium has been known to be harmful to human healthy , manily Via contaminated drinking water , food supplies , tobacco and industrial pollutant . The aim of this study was to determine the toxicity of new Cadmium (II) complex ( Bis[ 5- ( P- nitrophenyl ) – ? 4 – Phenyl- 1,2,4- triazole -3- dithiocarbamatohydrazide] cadmium (II) Hydra ( 0.5) and compare it with anticancer drug cyclophosphamide ( CP) in female albino mice . This complex causes to several alterations in Enzymatic activity of Glutamate Pyruvate Transaminase (GPT) and Alkaline Phosphatase (ALP ) in three organs after the treatment of mice with different doses of a new cadmium (II) complex ( 0.09 / 0.25ml , 0.18/ 0.5ml and 0.25mg /0.7 ml /30 gm of mous
... Show More