A case–control study (80 patients with chronic hepatitis B virus [HBV] infection and 96 controls) was performed to evaluate the association of an IL12A gene variant (rs582537 A/C/G) with HBV infection. Allele G showed a signifcantly lower frequency in patients compared to controls (31.2 vs. 46.9%; probability [p]=0.009; corrected p [pc]=0.027) and was associated with a lower risk of HBV infection (odds ratio [OR]=0.49; 95% confdence interval [CI]=0.29–0.83). A similar lower risk was associated with genotypes CG (17.5 vs. 29.2; OR=0.25; 95% CI=0.08–0.81; p=0.02) and GG (10.0 vs. 16.7; OR=0.25; 95% CI=0.07–0.91; p=0.036), but the pc value was not signifcant (0.12 and 0.126, respec‑ tively). Serum IL35 levels showed signifcant difere
... Show MoreAbstract
This research attempt to explain the essential aspects of one important model in management of Bank risks , that is (stress testing) , which increase the concentrate on it resulting the negative affects of Global financial crisis that it accuar in 2008 to study the application possibilities in iraqian banks to enhancing the safety and financial soundness Becuase the classical tools in Risk management don’t give clear image on Banks ability in facing risks, hence the Basel committee on Banking supervision focusing in agreement of Basel 2,3 on stress testing when it doing the internal capital adequacy assessment process (ICAAP) .
To achieving the reseach obje
... Show MoreThe aim of this research is to recognize the tasks undertaken by the headmasters of intermediate schools concerning time- administration, in accordance to the viewpoints of the headmasters of intermediate schools in the Administration of Education of Al-Karkh the Third. The sample of this research consists of (60) headmasters and &n
... Show MoreABSTRUCT
In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error ( λ ) in the model (SPSEM), estimated the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreThe aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreVaried uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r
... Show MoreTrajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show More