Abstract :H.pylori is an important cause of gastric duodenal disease, including gastric ulcers, Mucosa-associated lymphoid tissue (MALT), and gastric carcinoma. biosensors are becoming the most extensively studied discipline because the easy, rapid, low-cost, highly sensitive, and highly selective biosensors contribute to advances in next-generation medicines such as individualized medicine and ultrasensitive point-of-care detection of markers for diseases. Five of ten patients diagnosed with H.pylori ranging in age from 15–85 participated in this research. who [gastritis, duodenitis, duodenal ulcer (DU), and peptic ulcer (PU)] Suspected H.pylori colonies were identified by the presence of urease, catalase, oxidase activity, and PCR. All parameters are fixed: Laser power:40 mW, size of drops:25 μ, Turbidity:0.5. , Multi modes optical fiber, and Coreless optical fiber to construct optical biosensor (Multimode-Coreless-Multimode) optical fibers based on an inline Mach-Zehnder Interferometer. All samples had a sensitivity. Multimode-Coreless-Multimode optical Biosensor: is a rapid and sensitive method for the detection of H.pylori bacteria.
Background: Sprite coding is a very effective technique for clarifying the background video object. The sprite generation is an open issue because of the foreground objects which prevent the precision of camera motion estimation and blurs the created sprite. Objective: In this paper, a quick and basic static method for sprite area detection in video data is presented. Two statistical methods are applied; the mean and standard deviation of every pixel (over all group of video frame) to determine whether the pixel is a piece of the selected static sprite range or not. A binary map array is built for demonstrating the allocated sprite (as 1) while the non-sprite (as 0) pixels valued. Likewise, holes and gaps filling strategy was utilized to re
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt
Background: Most adult smokers start smoking regularly some time before 18 years of age. Cigarette smoking is a major ‘preventable’ cause of morbidity and mortality worldwide. It is well-known that smoking has hazardous effect on many systems like pulmonary and cardiovascular system.
Objectives: Study the prevalence of smoking among school pupils according to the mode of smoking, age, school grade, school environment and possible health risk associated with smoking. Type of the study: A cross-sectional study.
Methods: Study was conducted between 1st of March 2014 to 30th of May 2014 at Al-Doura/Al- Kurkh/Baghdad by using convenient sample, including all pupils from 6 schools. The schools were 2 secondary schools, 3 in
... Show MorePhonetics has close relevance with Musicology; in this study I decided explaining the interlinkages and harmony between Phonetics and Musicology. Linguists preceded philosophers in an attempt to link Phonetics with Musicology; the 1st serious attempt to link Phonetics with Musicology was done by Ibn Jeny (Dead 392 IC), but the real attempt is found with Farabi through his book under title Al Musiqa Al Kabeer, he defined music and link it with tune and relation between melody and tone, This is the same as pointed out by Ikhwan Al Safa who followed the doctrine of al-Farabi, their attention was with music and link it with phoneme, as they made music independent science, and they created special mathematics rules for it. Melody in music can
... Show More