G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the Relative mutability revealed that isolate G12 was highly mutable by both mutagens. The Relative mutational results showed also that isolate G12 is more sensitive, except when recording rifampicin resistance as a genetic marker, and this pattern was similar to NTG.
The major function of the kidney is the filtration and secretion of the final products of metabolism and the excess of electrolytes. The term kidney failure denotes inability of the kidneys to perform excretory function leading to retention of nitrogenous waste products from the blood. Biosensor are most accurate, with a rapid diagnosis ,more costly method than the traditional method to avoid any biological changes in blood sample that lead to changes optical characteristic (refractive index and absorption) of blood sample. The current study was designed to single mode more Sensitivity than multi mode for Biomarkers were recorded for Albumin 5447.06, 5193.93 and Urea sample 2623.14, 1998.44 in sm and mm respectively .
... Show MoreSo far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreThis study is carried out to investigate the prevalence of Coxiella burnetii (C. burnetii) infections in cattle using an enzyme-linked immunosorbent assay (ELISA) and polymerase chain reaction (PCR) assay targeting IS1111A transposase gene. A total of 130 lactating cows were randomly selected from different areas in Wasit province, Iraq and subjected to blood and milk sampling during the period extended between November 2018 and May 2019. ELISA and PCR tests revealed that 16.15% and 10% of the animals studied were respectively positive. Significant correlations (P<0.05) were detected between the positive results and clinical data. Two positive PCR products were analyzed phylogenetically, named as C. burnetii IQ-No.5 and C. burnet
... Show MoreA simple and smart algorithm was presented to recognize car plates in parking at the College of Science for Women, University of Baghdad, Iraq. The study consists of recording video clips of all cars parked in the selected area. The studied camera heights were1m and 2m, and the video clips were 19 and 30. Images were extracted from the video clip to be used for training data for the cascade method. Haar classification was used to detect license plates after the training step. Viola-jones algorithm was applied to the output of Haar’s data for both camera heights (1m and 2m). The accuracy was calculated for all data with different weather conditions and local time recoding. The accuracy is 100% for all data in this study.
<
... Show MoreThe Present investigation includes the isolation and identification of Pseudomonas aeruginosa for different cases of hospital contamination from 1/ 6/2003 to 30/9/2004, the identification of bacteria depended on morphological , cultural and biochemical characters, 37 of isolates were diagnosed from 70 smears from wounds and burns beside 25 isolates were identified from 200 smears taken from operation theater and hospital wards including the floors , walls , sources of light and operation equipment the sensitivity of all isolates to antibiotic were done , which exhibited complete sensitivity to Ciprofloxacin , Ceftraixon, Tobromycin and Gentamysin ,while they were complete resist to Amoxcillin , Tetracyclin , Nitrofurantion , Clindamycin C
... Show MoreSmishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreThis study detects the presence of cholesterol in an Iraqi plant named Suaeda baccata Forsk of the family Chenopodiacae, wildly and widely grown in Iraq. The absence of any publication concerning the sterol content of this Suaeda specie, and the industrial importance of cholesterol depending on its role as a precursor in the synthesis of some hormones, like progesterone, acquired this study its value. The investigations revealed the presence of cholesterol that was proved by TLC together with the standard compound cholesterol, and anisaldehyde spray reagent using three different solvent systems, then authenticated by HPLC, in which the reten
... Show MoreObjective: the aim of the study is to assess the knowledge and practices for nurses that working in
words of Ibn Al-kuff hospital for spinal cord injuries.
Methodology: descriptive study from the period of (1st of July to the 30th August 2005) about the
knowledge and practical management when autonomic dysreflexia syndrome affects those patients
whom sleeping in the words of this hospital and its relationship with some variables.
The sample of the study consists of (100) nurses male and females are selected purposively. a
questionnaire check list was designed for study purpose and applied by (test - retest) to improve the
reliability, the validity of the assessment was determined through a panel of experts.
The da
The Multiplicative Cyclic Group has been used to construct a New Digital Algebraic Generator System (NDAGS). This cryptosystem can be classified as a stream cipher cryptosystem. In this paper we will estimate the efficiency and security of the (NDAGS) by using the Basic Efficiency Criteria (BEC). A comparison has made between the some known generators and (NDAGS). The results of applying the BEC and the comparison results proof the high efficiency of the (NDAGS).
The herein research was carried out in order to identified the presence of bacteria in cervix and uterine lumen in Iraqi cattle during the different estrus phase with focusing on Protus and E coli. Estrus phases were determined by the structures which found on ovary (follicular growth for pro-estrus, mature growing follicle for estrus, hemorrhagic corpus luteam for meta-estrus and active corpus luteam for di-eatrus). Forty cervical swabs (ten for each estrus phase) and forty uterine swabs (ten for each estrus phase) were taken from macroscopically healthy reproductive animals after slaughtering and cultivated on nutrient agar and blood agar, the bacterial isolation were identified with biochemical teats. The present study found that
... Show More