Beta thalassemia major (BTM) is a genetic disorder that has been linked to an increased risk of contracting blood-borne viral infections, primarily due to the frequent blood transfusions required to manage the condition. One such virus that can be transmitted through blood is the Human Parvovirus B19 (B19V). The aim of this study was to investigate the frequency and molecular detection of B19V. This study included 60 blood donors as controls and 120 BTM patients. B19V was identified by serology, which measured B19-IgG and B19-IgM antibodies. Nested Polymerase Chain Reaction (nPCR) was employed to target the VP1/VP2 structural proteins. The results showed that B19V seropositivity represents 27.5% (33 out of 120) in BTM patients, and
... Show MoreThis paper present a simple and sensitive method for the determination of DL-Histidine using FIA-Chemiluminometric measurement resulted from oxidation of luminol molecule by hydrogen peroxide in alkaline medium in the presence of DL-Histidine. Using 70?l. sample linear plot with a coefficient of determination 95.79% for (5-60) mmol.L-1 while for a quadratic relation C.O.D = 96.44% for (5-80) mmol.L-1 and found that guadratic plot in more representative. Limit of detection was 31.93 ?g DL-Histidine (S/N = 3), repeatability of measurement was less that 5% (n=6). Positive and negative ion interferances was removed by using minicolume containing ion exchange resin located after injection valve position.
This study was aimed to use plant tissue culture technique to induce callus formation of Aloe vera on MS. Medium supplied with 10 mg/l NAA and 5 mg/l BA that exhibit the best results even with subculturing. As the method of [1] 1g. dru weight of callus induced from A. vera crown and in vivo crown were extracted then injected in HPLC using the standards of Ascorbic acid (vit. C), Salysilic acid and Nicotenic acid (vit. B5) to compare with the plant extracts. Results showed high potential of increasing some secondary products using the crown callus culture of A. vera as compared with in vivo crown, Ascorbic acid was 1.829 ?g/l in in vivo crown and increased to 3.905 ?g/l crown callus culture . Salysilic acid raised from 3.54 ?g/l in in vivo c
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreIntroduction The abortions reasons in several circumstances yet are mysterious, nevertheless the bacterial toxicities signify a main reason in abortion, where germs seems to be the utmost elaborate pathogens (Khameneh et.al., 2014) and (Oliver and Overton ,2014). Between numerous germs, Humano