Herpes simplex virus (HSV) is a common human pathogen that causes severe infections in newborns and immunocompromised patients. Conjunctivitis or corneal epithelial keratitis is caused by HSV type 1 all over the world and at all times of the year. The present study was aimed at detecting HSV in patients suffering from conjunctivitis. One hundred and ten (110) clinical samples (90 patients and 20 controls, both males and females) of eye conjunctiva swabs were collected from patients of different ages. The samples were analyzed using qPCR and ELISA techniques. The qPCR results revealed that HSV was present in 47 (52.2%) of the 90 patients who were infected. Of these patients, 25 (48.0%) were males and 22 (57.8%) were females, indicating that females are more susceptible to infection. According to the results by age group, patients over 50 years old had a higher rate (81.8%), making young adults more susceptible to infection. The prevalence of HSV-positive results by ELISA was observed in 29 (32.3%) individuals, including 16 (30.7%) males and 13 (34.2%) females, indicating that females are more susceptible to infection. Adults over the age of 50 (54.5%) are more susceptible to infection, according to the age group’s HSV-positive outcomes. HSV type 1 infection is highly prevalent among Iraqi conjunctivitis patients, with a statistically significant difference when compared to controls, based on the two techniques. The findings of this study indicate that qPCR is more accurate and reliable than the ELISA technique for detecting HSV type 1.
In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show MoreHigh Q-factor based on absorption can be achieved by tuning (the reflection and the transition percentage). In this work, the simple design and simulated in S-band have been investigated. The simulation results of G-shape resonator are shown triple band of absorption peaks 60%, 91.5%, and 70.3%) at resonance frequency 2.7 GHz, 3.26 GHz, and 4.05 GHz respectively. The results exhibited very high of the Q-factor ( 271 ) at resonance frequency ( 3.26 GHz ). The high Q-factor can be used to enhance the sensor sensing, narrowband band filter and image sensing.
Background: Type 2 diabetes mellitus (T2DM) is a chronic disorder that constitutes a major health problem worldwide. Toxoplasma gondii is an intracellular parasite that may infect any nucleated cell. Toxoplasmosis is becoming a worldwide health threat, infecting 30–50% of the world’s human population. The studies that have been undertaken to investigate the link between T. gondii infection and diabetes have shown contradictory fi ndings. This research aimed to look at the possible link between T2DM and T. gondii infection. Methods and Subjects: The enzyme-linked immunosorbent assay (ELISA) approach was used to screen for T. gondii IgM and IgG antibodies in 69 patients with T2DM and 92 seemingly healthy persons as controls. Resul
... Show MoreBackground: (ABO) Blood type have an effect on general health including oral health as salivary physicochemical characteristics differ among different type of blood and as consequence these affect the severity of dental caries. The aim of the present study is an assessment of the prevalence of caries experience among different blood type in relation to salivary physicochemical characteristic. Materials and Methods: Two hundred and fifty females' college students in Al-Qadisyia University aged 18 years old were selected on random basis; they were divided to four groups according to their blood type, Dental experience was diagnosed and recorded according to DMFs (Mülemman, 1976) Index, this allows recording decayed lesion by severity. A su
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show MoreMany approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show More