Abstract :H.pylori is an important cause of gastric duodenal disease, including gastric ulcers, Mucosa-associated lymphoid tissue (MALT), and gastric carcinoma. biosensors are becoming the most extensively studied discipline because the easy, rapid, low-cost, highly sensitive, and highly selective biosensors contribute to advances in next-generation medicines such as individualized medicine and ultrasensitive point-of-care detection of markers for diseases. Five of ten patients diagnosed with H.pylori ranging in age from 15–85 participated in this research. who [gastritis, duodenitis, duodenal ulcer (DU), and peptic ulcer (PU)] Suspected H.pylori colonies were identified by the presence of urease, catalase, oxidase activity, and PCR. All parameters are fixed: Laser power:40 mW, size of drops:25 μ, Turbidity:0.5. , Multi modes optical fiber, and Coreless optical fiber to construct optical biosensor (Multimode-Coreless-Multimode) optical fibers based on an inline Mach-Zehnder Interferometer. All samples had a sensitivity. Multimode-Coreless-Multimode optical Biosensor: is a rapid and sensitive method for the detection of H.pylori bacteria.
Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a local
... Show MoreA special methodology for adding a watermark for colored (RGB) image is formed and adding the wavelet transform as a tool during this paper. The watermark is added into two components. The primary one is by taking the key that contain associate eight range from (0...7) every range in it determines the actual bit position in specific component of canopy image. If that bit is analogous to the bit in watermark, (0) are hold on within the Least Significant Bit (LSB) of the watermarked image; otherwise (1) are hold on. The other is that it will add multiple secret keys victimization shift and rotate operations. The watermark is embedded redundantly over all extracted blocks in image to extend image protection. This embedding is completed with
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research sheds light on the development that has occurred on the use of press pictures in the Iraqi press by analyzing the form and content of the images used in (Al-Sabaah) newspaper for the 2012 model. The researcher's interest in this topic for what represented by the press picture of a way to highlight and attract the reader's attention to the substance journalist who represents the goals behind the newspaper publishing.
This research is divided into three sections. The first one dealt with the methodological framework of the research, and the second part addressed the aspect of press pictures and its history and technological development, while the third section devoted to the study of the development of the form and co
... Show MoreIn this study, an efficient novel technique is presented to obtain a more accurate analytical solution to nonlinear pantograph differential equations. This technique combines the Adomian decomposition method (ADM) with the homotopy analysis method concepts (HAM). The whole integral part of HAM is used instead of an integral part of ADM approach to get higher accurate results. The main advantage of this technique is that it gives a large and more extended convergent region of iterative approximate solutions for long time intervals that rapidly converge to the exact solution. Another advantage is capable of providing a continuous representation of the approximate solutions, which gives better information over whole time interv
... Show MoreThe paper reports the influence of the thickness on the some optical properties of Fe2O3 thin films,which were prepared by chemical Spray pyrolysis technique on glass substrate heated to 400˚c.The thickness of thin films (250,280,350)nm were measured by using weighting method. The optical properties include the absorbance and reflectance spectra,extinction coefficient,and real and imaginary part of the dielectric constant.The result showed that the optical constant(k,εr,εi)decreased with the increase of the thickness.
To determine the important pathogenic role of celiac disease in triggering several
autoimmune disease, thirty patients with Multiple Sclerosis of ages (22-55) years
have been investigated and compared with 25 healthy individuals. All the studied
groups were carried out to measure anti-tissue transglutaminase antibodies IgA IgG
by ELISA test, anti-reticulin antibodies IgA and IgG, and anti-endomysial
antibodies IgA and IgG by IFAT. There was a significant elevation in the
concentration of anti-tissue transglutaminase antibodies IgA and IgG compared to
control groups (P≤0.05), there was 4(13.33%) positive results for anti-reticulin
antibodies IgA and IgG , 3(10%) positive results for anti-endomysial antibodies
One of the major environmental problems is the pollution of water and soilsby toxic
heavy metals.The aim of current study was estimatation the ability of Eclipta alba
plant for the removal of (Pb) from the polluted water by phytoremedation technique
and study the effect of a number of parameters(Pb concentration, contact time and
pHvalues). The plant showed higher removal efficiency (99.2%) after 7 days of
treatment at 50ppm.The best removal efficiency of Pb 98.95% at 100ppm was
occurred at pH7. The root ability to accumulate Pb was more than the shoot ability,
after 7 days treatment of water and pH=7, they were 2852.5 mg/kg, 2497.5 mg/kg
and 502.5 mg/kg in roots, stems and leaves respectively. These results showe